PrepAway - Latest Free Exam Questions & Answers

Which of the following should the security administrator use to identify similar malware?

The security administrator is implementing a malware storage system to archive all malware seen by the
company into a central database. The malware must be categorized and stored based on similarities in
the code. Which of the following should the security administrator use to identify similar malware?

PrepAway - Latest Free Exam Questions & Answers

A.
TwoFish

B.
SHA-512

C.
Fuzzy hashes

D.
HMAC

Explanation:
Hashing is used to ensure that a message has not been altered. It can be useful for positively identifying
malware when a suspected file has the same hash value as a known piece of malware. However,
modifying a single bit of a malicious file will alter its hash value. To counter this, a continuous stream of
hash values is generated for rolling block of code. This can be used to determine the similarity between a
suspected file and known pieces of malware.
Incorrect Answers:
A: Twofish is a block cipher algorithm that operates on 128-bit blocks of data and can use cryptographic
keys of up to 256 bits in length. It is used to provide confidentiality protection of data.
B: SHA-512 is a version of Secure Hash Algorithm (SHA) and is a 512-bit hash algorithm that can be used
for hashing. Hashing is not an encryption algorithm but the hash can be used to verify that the data has
not been altered.
D: Hash-based Message Authentication Code (HMAC) is a hash algorithm that guarantees the integrity of
a message during transmission, but does not provide non-repudiation.

http://blog.sei.cmu.edu/post.cfm/fuzzy-hashing-techniques-in-applied-malware-analysis
Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, 6th Edition, Sybex, Indianapolis,
2014, pp. 332-333, 336


Leave a Reply