Assignment: Malware Threats | Ethical Hacking using Kali Linux (in English) - Software Development PDF Download

Multiple Choice Questions (MCQs)

Q1: What is the primary function of a Trojan horse in cybersecurity?
(a) Encrypt user data for ransom
(b) Appear as a legitimate program while performing malicious actions
(c) Spread automatically without user interaction
(d) Record keystrokes and steal credentials
Ans: (b) Appear as a legitimate program while performing malicious actions

Q2: Which of the following is an example of ransomware?
(a) WannaCry
(b) Stuxnet
(c) SQL Slammer
(d) Netbus
Ans: (a) WannaCry

Q3: What does a keylogger do?
(a) Encrypts files on a victim’s computer
(b) Records keystrokes to steal sensitive information
(c) Hides files from the user
(d) Spreads via network shares
Ans: (b) Records keystrokes to steal sensitive information

Q4: Which command is used in Linux to check running processes for malware?
(a) top
(b) ps aux
(c) ls -l
(d) df -h
Ans: (b) ps aux

Q5: Which type of malware spreads without user interaction?
(a) Virus
(b) Worm
(c) Trojan
(d) Rootkit
Ans: (b) Worm

Q6: What is a common persistence technique used by malware?
(a) Creating a registry entry
(b) Running as a guest user
(c) Using the cd command
(d) Disabling firewalls
Ans: (a) Creating a registry entry

Q7: What is the purpose of a rootkit?
(a) Encrypt user files
(b) Provide unauthorized access while remaining hidden
(c) Display fake antivirus alerts
(d) Log out users from the system
Ans: (b) Provide unauthorized access while remaining hidden

Q8: What command is used to scan for malware in a Linux system?
(a) chkrootkit
(b) netstat
(c) whoami
(d) cat /etc/passwd
Ans: (a) chkrootkit

Q9: What technique do attackers use to distribute malware via email?
(a) Phishing
(b) Port scanning
(c) DNS spoofing
(d) Keylogging
Ans: (a) Phishing

Q10: Which tool is commonly used for malware analysis?
(a) Wireshark
(b) Metasploit
(c) Volatility
(d) Aircrack-ng
Ans: (c) Volatility

Fill in the Blanks

Q1: A ________ disguises itself as legitimate software while performing malicious actions.
Ans: Trojan horse

Q2: ________ is a type of malware that demands payment to restore access to files.
Ans: Ransomware

Q3: Attackers use ________ to send deceptive emails that trick users into downloading malware.
Ans: Phishing

Q4: ________ is a command-line tool used to detect rootkits on Linux systems.
Ans: chkrootkit

Q5: ________ is a memory forensics tool used for analyzing malware in RAM.
Ans: Volatility

True/False

1. Worms require user interaction to spread.
Ans: False

2. Keyloggers can be both hardware and software-based.
Ans: True

3. A rootkit hides itself and other malicious activities on a system.
Ans: True

4. Ransomware typically spreads through brute-force attacks.
Ans: False

5. Antivirus software can always detect zero-day malware.
Ans: False

Download the notes
Assignment: Malware Threats
Download as PDF
Download as PDF

HOTS (Higher Order Thinking Skills) Questions

Q1: Your company’s network has been infected with ransomware. What immediate steps would you take to minimize damage?
Ans: Disconnect affected systems, identify the ransomware type, restore from backups, report the attack, and update security policies.

Q2: A user reports suspicious activity on their machine. You suspect a Trojan is running in the background. How would you verify and remove it?
Ans: Use ps aux (Linux) or tasklist (Windows) to check running processes, scan with chkrootkit or an antivirus, and remove malicious entries from startup.

Q3: You need to analyze a suspected malware file. What steps would you take in a controlled environment?
Ans: Use a virtual machine, analyze with Volatility, inspect network traffic with Wireshark, and decompile the malware if necessary.

Q4: An employee unknowingly clicked on a phishing email attachment. What security measures should be in place to prevent such incidents?
Ans: Implement email filtering, conduct cybersecurity training, enable multi-factor authentication, and use endpoint protection tools.

Q5: A Linux server is behaving suspiciously, and you suspect it has been compromised by a rootkit. How would you investigate?
Ans: Run chkrootkit or rkhunter, check for hidden processes (lsmod, ps aux), and inspect network activity (netstat -an).

Take a Practice Test
Test yourself on topics from Software Development exam
Practice Now
Practice Now

Hands-on Coding Questions

Q1: Write a Python script to detect running processes and check for suspicious ones.
Ans:
import psutil
suspicious_processes = ["nc", "netcat", "meterpreter", "keylogger"]
for process in psutil.process_iter(['pid', 'name']):
    if process.info['name'] in suspicious_processes:
        print(f"Suspicious process detected: {process.info['name']} (PID: {process.info['pid']})")

Q2: Create a Bash script that scans for rootkits using chkrootkit and outputs the results to a log file.
Ans:
#!/bin/bash
echo "Running chkrootkit scan..." > malware_scan.log
chkrootkit >> malware_scan.log
echo "Scan complete. Check malware_scan.log for details."

The document Assignment: Malware Threats | Ethical Hacking using Kali Linux (in English) - Software Development is a part of the Software Development Course Ethical Hacking using Kali Linux (in English).
All you need of Software Development at this link: Software Development
Are you preparing for Software Development Exam? Then you should check out the best video lectures, notes, free mock test series, crash course and much more provided by EduRev. You also get your detailed analysis and report cards along with 24x7 doubt solving for you to excel in Software Development exam. So join EduRev now and revolutionise the way you learn!
Sign up for Free Download App for Free
95 videos|6 docs

Up next

FAQs on Assignment: Malware Threats - Ethical Hacking using Kali Linux (in English) - Software Development

1. What are the common types of malware threats that software developers should be aware of?
Ans. Common types of malware threats include viruses, worms, Trojans, ransomware, spyware, adware, and rootkits. Each type has its distinct characteristics and can affect systems in various ways, such as stealing data, encrypting files, or creating backdoors for unauthorized access.
2. How can software developers protect their applications from malware threats?
Ans. Software developers can protect their applications by implementing secure coding practices, conducting regular security audits, using antivirus and anti-malware tools, keeping software and libraries up to date, and educating users about safe online practices.
3. What is the impact of ransomware on software development and businesses?
Ans. Ransomware can severely impact software development and businesses by encrypting critical data and demanding payment for decryption. This can lead to significant financial losses, disruption of services, damage to reputation, and loss of customer trust if sensitive data is compromised.
4. Why is it important for software developers to stay updated on malware threats?
Ans. It is important for software developers to stay updated on malware threats to understand the evolving landscape of cybersecurity, adapt their development practices accordingly, and ensure that their applications are resilient against new and emerging threats, ultimately protecting users and data.
5. What role do user education and awareness play in mitigating malware threats?
Ans. User education and awareness play a crucial role in mitigating malware threats as informed users are less likely to fall victim to phishing attacks, download malicious software, or engage in risky online behavior. Educating users about safe practices and the importance of security can significantly reduce the risk of malware infections.

Up next

Explore Courses for Software Development exam
Related Searches

mock tests for examination

,

past year papers

,

Exam

,

Objective type Questions

,

Previous Year Questions with Solutions

,

Assignment: Malware Threats | Ethical Hacking using Kali Linux (in English) - Software Development

,

ppt

,

MCQs

,

video lectures

,

Summary

,

pdf

,

study material

,

shortcuts and tricks

,

Important questions

,

Sample Paper

,

Assignment: Malware Threats | Ethical Hacking using Kali Linux (in English) - Software Development

,

Free

,

Semester Notes

,

practice quizzes

,

Assignment: Malware Threats | Ethical Hacking using Kali Linux (in English) - Software Development

,

Extra Questions

,

Viva Questions

;