Cybersecurity – Interview preparation – MALWARE questions – part 1

Hi All,

Greetings for the day!

Continuing exploring CYBERSECURITY. In this article I will share MALWARE related questions.

We have articles for preparing Cybersecurity interviews, understanding general concepts. Please refer. https://knowledge-junction.in/cybersecurity-interview-preparation/

Q 1 . What are MALWARE’s?

  • Malicious Software
  • General term used for software that is harmful or intrusive.
  • Viruses, Ransomware, worms and Trojans.

Q 2. Explain the term – TROJAN?

  • A type of MALWARE.
  • This looks like legitimate software which tricks user to installing them and opens backdoor on the system for malicious access.

Q 3. Explain the term – VIRUS?

  • A type of MALWARE
  • Malware when executed, replicates by inserting their own code into computer systems

Q 4. What is the difference between TROJAN HORSE and VIRUS?

VIRUSTROJAN HORSE
Instances of Malware that, when executed, replicate by inserting their own code into systemsMalware that is either disguised as nonmalicious software or hidden within legitimate, nonmalicious application
Viruses are self-propogateTrojans dont self-propogate

Q 5. Give some examples of MALWARE’s?

  • Viruses
  • Worms
  • Ransomware
  • Spyware
  • Adware
  • Trojan Horses
  • Rootkits
  • Keyloggers

Q 6. Explain the term – Worms

  • Type of MALWARE
  • Replicate themselves without the need if hosts in order to spread
  • These normally consumes Network bandwidth
  • Worms slows down Network Connections

Q 7. What is STEALTH?

  • Virus.
  • Operates in a hidden mode.
  • Type of malware designed to hide its presence.
  • The stealth virus avoids detection by copying itself from one file to another and replacing itself with a “clean” file.

Q 8. What is LOGIC BOMB

  • Malware.
  • Triggers on particular events such as Date/Time or other milestones such as number of subscribers, revenue threshold etc.

Q 9. What are anti-malware’s? Give example?

  • Anti-Malware’s are softwares / applications that protect our systems / computers / mobiles / networks from malwares
  • Examples: Anti Virus softwares – Norton Antivirus

Q 10. What are Anomaly-based anti-malware?

  • Anomaly based anti-malware is ideal for detecting unknown viruses.
  • These anti-malware operates by observing abnormal behavior of application. Ex : Malware is opening ports unnecessarily.
  • NBA (Network-based anomaly detection)

REFERENCES

Thank you Life is beautiful 🙂

Have a Great Time Ahead 🙂

Prasham Sabadra

LIFE IS VERY BEAUTIFUL. ENJOY THE WHOLE JOURNEY :) Founder of Microsoft 365 Junction, Speaker, Author, Learner, Developer, Passionate Techie. Certified Professional Workshop Facilitator / Public Speaker. Believe in knowledge sharing. Around 20+ years of total IT experience and 17+ years of experience in SharePoint and Microsoft 365 services Please feel free me to contact for any SharePoint / Microsoft 365 queries. I am also very much interested in behavioral (life changing) sessions like motivational speeches, Success, Goal Setting, About Life, How to live Life etc. My book - Microsoft 365 Power Shell hand book for Administrators and Beginners and 100 Power Shell Interview Questions - https://www.amazon.in/Microsoft-Administrators-Beginners-Interview-Questions/dp/9394901639/ref=tmm_pap_swatch_0?_encoding=UTF8&qid=1679029081&sr=8-11

You may also like...

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from Microsoft 365

Subscribe now to keep reading and get access to the full archive.

Continue reading