100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

EEL4806 Final Exam Prep and Review – Malware, Network Analysis, Spoofing, Social Engineering, and Tools (Chapters 8–14).

Rating
-
Sold
-
Pages
36
Grade
A+
Uploaded on
20-06-2025
Written in
2024/2025

This document contains a comprehensive set of multiple-choice review questions and answers covering Chapters 8 through 14 of the EEL4806 course at Florida International University. Topics include malware types and behaviors, analysis tools, network traffic inspection, spoofing techniques, and social engineering tactics. It is tailored for final exam preparation, ensuring alignment with key learning objectives and tools discussed in the course.

Show more Read less
Institution
Course











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course

Document information

Uploaded on
June 20, 2025
Number of pages
36
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

,EEL4806 Final Exam Prep and Review –
Malware, Network Analysis, Spoofing, Social
Engineering, and Tools (Chapters 8–14).
In a botnet, what are the systems that tell individual bots what to do called?
A C2 servers
B IRC servers
C HTTP servers
D ISC2 servers

C2 servers

What is the primary difference between a worm and a virus?
A A worm uses polymorphic code
B A virus uses polymorphic code
C A worm can self-propagate
D A virus can self-propagate

A worm can self-propagate

What is one advantage of static analysis over dynamic analysis of malware?
A Malware is guaranteed to deploy
B Dynamic analysis is untrustworthy
C Static analysis limits your exposure to infection
D Static analysis can be rune in virtual machines

Static analysis limits your exposure to infection

What would you use VirusTotal for?
A Checking your system for viruses
B Endpoint protection
C As a repository of malware research
D Identifying malware against antivirus engines

Identifying malware against antivirus engines

What are two sections you would commonly find in a portable executable file?
A Text and binary
B Binary and data
C Addresses and operations
D Text and data

Text and data

What could you use to generate your own malware?
A Empire

,B Metasploit
C Rcconsole
D IDA pro

Metasploit

What is the purpose of a packer for malware?
A To obscure the actual program
B To ensure that the program is all binary
C To compile the program into a tight space
D To remove all characters

To obscure the actual program

What is the primary purpose of polymorphic code for malware programs?
A Efficiency of execution
B Propagation of the malware
C Antivirus evasion
D Faster compilation

Antivirus evasion

What would be one reason not to write malware in Python?
A Python interpreter is slow
B Python interpreter may not be available
C Library support is inadequate
D Python is a hard language to learn

Python interpreter may not be available

What would you use Cuckoo Sandbox for?
A Static analysis of malware
B Malware development
C Dynamic analysis of malware
D Manual analysis of malware

Dynamic analysis of malware

If you wanted a tool that could help with both static and dynamic analysis of malware, which would
you choose?
A Cutter
B IDA
C PE Explorer
D MalAlyzer

IDA

What is the purpose of using a disassembler?
A Converting opcodes to mnemonics
B Converting mnemonics to opcodes

, C Translating mnemonics to operations
D Removing the need for an assembler

Converting opcodes to mnemonics

What does the malware that is referred to as a dropper do?
A Drops the antivirus operations
B Drops the CPU protections against malicious execution
C Drops files that may be more malware
D Drops the malware into the Recycle Bin

Drops files that may be more malware

Why would you use an encoder when you are creating malware using Metasploit?
A To compile the malware
B To evade antivirus
C To evade user detection
D To compress the malware

To evade antivirus

If you were to see the following command in someone's history, what would you think had
happened?
msfvenom -i 5 -p windows/x64/shell_reverse_tcp -o program
A A poison pill was created
B A malicious program was generated
C Existing malware was encoded
D Metasploit was started

A malicious program was generated

What is the difference between a virus and ransomware?
A Ransomware may be a virus
B Ransomware includes Bitcoins
C Ransomware is only generated in Russia
D A virus only runs on windows systems

Ransomware may be a virus

Why would someone use a Trojan?
A It acts as malware infrastructure
B It evades antivirus
C Its pretends to be something else
D Its polymorphic

It pretends to be something else

Which of these tools would be most beneficial when trying to dynamically analyze malware?
A Cutter
B OllyDbg

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ACADEMICAIDSTORE Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
1195
Member since
4 year
Number of followers
889
Documents
11506
Last sold
1 week ago
ACADEMICAID STORE

Contact : Email: : I have solutions for : Nursing, Business, Economics, Accounting, statistics, chemistry, Biology and all Courses, Certifications and Subjects. Send us a message in case you need any additional information! Nursing Being my main profession line, I have essential guides that are Almost A+ graded, I am a very friendly person: If you would not agreed with my solutions I am ready for refund.

Read more Read less
4.1

173 reviews

5
95
4
29
3
28
2
6
1
15

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions