PrepAway - Latest Free Exam Questions & Answers

which is difficult to reverse engineer in a virtual lab?

Which of the following describes a type of malware which is difficult to reverse engineer in a virtual
lab?

PrepAway - Latest Free Exam Questions & Answers

A.
Armored virus

B.
Polymorphic malware

C.
Logic bomb

D.
Rootkit

Explanation:

One Comment on “which is difficult to reverse engineer in a virtual lab?

  1. meac says:

    This is a catch question, namely: Is a VIRUS a MALWARE?
    The short answer is: Yes and No.!

    The term “malware” is short for “malicious software”.
    As computer viruses are undoubtedly malicious, they fall into the category of malware, just as trojans, rootkits or spyware do. … But just as every dog is not a dachshund, not every piece of malware is a virus, but rather belongs to a subcategory

    Also, any type of malware can be reversed engineered. This includes Armored Virus, Polymorphic malware, logic bombs and rookits

    So we have two real contenders as a possible answer in here.

    **A An armored virus is a type of virus that has been designed to thwart attempts by analysts from examining its code by using various methods to make tracing, disassembling and reverse engineering more difficult.
    An Armored Virus may also protect itself from antivirus programs, making it more difficult to trace.
    To do this, the Armoured Virus attempts to trick the antivirus program into believing its location is somewhere other than where it really is on the system.

    **B- Polymorphic malware is a type of malware that constantly changes its identifiable features in order to evade detection. Many of the common forms of malware can be polymorphic, including viruses, worms, bots, trojans, or keyloggers.

    Yet, the MOST difficult to engineer is by definition an “Armored virus”




    0



    0

Leave a Reply