Cybersecurity – Interview preparation – MALWARE questions – part 1
Hi All,
Greetings for the day!
Continuing exploring CYBERSECURITY. In this article I will share MALWARE related questions.
We have articles for preparing Cybersecurity interviews, understanding general concepts. Please refer. https://knowledge-junction.in/cybersecurity-interview-preparation/
Q 1 . What are MALWARE’s?
- Malicious Software
- General term used for software that is harmful or intrusive.
- Viruses, Ransomware, worms and Trojans.
Q 2. Explain the term – TROJAN?
- A type of MALWARE.
- This looks like legitimate software which tricks user to installing them and opens backdoor on the system for malicious access.
Q 3. Explain the term – VIRUS?
- A type of MALWARE
- Malware when executed, replicates by inserting their own code into computer systems
Q 4. What is the difference between TROJAN HORSE and VIRUS?
| VIRUS | TROJAN HORSE |
| Instances of Malware that, when executed, replicate by inserting their own code into systems | Malware that is either disguised as nonmalicious software or hidden within legitimate, nonmalicious application |
| Viruses are self-propogate | Trojans dont self-propogate |
Q 5. Give some examples of MALWARE’s?
- Viruses
- Worms
- Ransomware
- Spyware
- Adware
- Trojan Horses
- Rootkits
- Keyloggers
Q 6. Explain the term – Worms
- Type of MALWARE
- Replicate themselves without the need if hosts in order to spread
- These normally consumes Network bandwidth
- Worms slows down Network Connections
Q 7. What is STEALTH?
- Virus.
- Operates in a hidden mode.
- Type of malware designed to hide its presence.
- The stealth virus avoids detection by copying itself from one file to another and replacing itself with a “clean” file.
Q 8. What is LOGIC BOMB
- Malware.
- Triggers on particular events such as Date/Time or other milestones such as number of subscribers, revenue threshold etc.
Q 9. What are anti-malware’s? Give example?
- Anti-Malware’s are softwares / applications that protect our systems / computers / mobiles / networks from malwares
- Examples: Anti Virus softwares – Norton Antivirus
Q 10. What are Anomaly-based anti-malware?
- Anomaly based anti-malware is ideal for detecting unknown viruses.
- These anti-malware operates by observing abnormal behavior of application. Ex : Malware is opening ports unnecessarily.
- NBA (Network-based anomaly detection)
- CyberSecurity technique
- This technique uses network behavior analysis (NBA) to continuously monitor network traffic and identify deviations from normal patterns to detect potential security threats, such as DDoS attacks, data breaches, or unauthorized access
REFERENCES
- CyberSecurity Interview Preparation : https://knowledge-junction.in/cybersecurity-interview-preparation/
- Beginner’s Guide: Cybersecurity Questions for Interviews – 1 : https://knowledge-junction.in/2024/12/17/beginners-guide-cybersecurity-questions-for-interviews-1/
- CyberSecurity – Interview preparation for beginners – 2 : https://knowledge-junction.in/2024/12/21/cybersecurity-interview-preparation-for-beginners-2/
- Preparing exam SC – 900 – Microsoft Security, Compliance, and Identity Fundamentals – Explaining few terms related to Security – Part 1 – https://knowledge-junction.in/2022/05/26/preparing-exam-sc-900-microsoft-security-compliance-and-identity-fundamentals-explaining-few-terms-related-to-security-part-1/
- Cybersecurity terminologies – Letter A – https://knowledge-junction.in/2025/09/01/cybersecurity-terminologies-letter-a/
- Cybersecurity terminologies – Letter C – https://knowledge-junction.in/2024/11/12/cybersecurity-terminologies-c/
- Cybersecurity terminologies – Letter S – https://knowledge-junction.in/2024/12/21/cybersecurity-terminologies-letter-s/
Thank you Life is beautiful 🙂
Have a Great Time Ahead 🙂
