CEH - Certified Ethical Hacker Practice Questions: Malware Threats Domain

Test your CEH - Certified Ethical Hacker knowledge with 5 practice questions from the Malware Threats domain. Includes detailed explanations and answers.

CEH - Certified Ethical Hacker Practice Questions

Master the Malware Threats Domain

Test your knowledge in the Malware Threats domain with these 5 practice questions. Each question is designed to help you prepare for the CEH - Certified Ethical Hacker certification exam with detailed explanations to reinforce your learning.

Question 1

A client reports that their systems are frequently crashing, and you suspect malware interference. What is the best course of action to identify the cause?

A) Run a full system scan using an up-to-date antivirus program.

B) Check system logs for any unusual errors or warnings.

C) Reformat the system to eliminate any malware traces.

D) Reboot the system in safe mode and observe behavior.

Show Answer & Explanation

Correct Answer: A

Explanation: Running a full system scan is effective in identifying and potentially removing known malware. Checking logs and rebooting in safe mode can provide more information but will not directly identify malware. Reformatting is drastic and should be a last resort after confirming malware presence.

Question 2

You are analyzing a piece of malware that refused to execute in your controlled lab environment. Which technique is the malware likely using to avoid detection?

A) Heuristic evasion

B) Code obfuscation

C) Sandbox detection

D) Rootkit installation

Show Answer & Explanation

Correct Answer: C

Explanation: Sandbox detection allows malware to identify when it is running in an analysis environment (like a sandbox) and not execute to avoid detection.

Question 3

While conducting a malware analysis, you discover that a suspicious file attempts to connect to an external IP address. What is the best course of action for an ethical hacker?

A) Block the IP at the firewall to prevent further connections.

B) Trace the IP address to identify the location of the server.

C) Submit the IP address to an online threat intelligence service.

D) Isolate the sample in a sandbox and monitor network activity.

Show Answer & Explanation

Correct Answer: D

Explanation: Isolating the sample in a sandbox and monitoring its network activity allows safe observation of the malware's behavior, providing valuable intelligence. Blocking the IP and tracing it are important but secondary actions. Submitting to threat intelligence helps with future protection but is not the immediate step.

Question 4

Which of the following techniques is used by malware to evade detection by antivirus software?

A) Port scanning

B) Code obfuscation

C) Packet sniffing

D) SQL injection

Show Answer & Explanation

Correct Answer: B

Explanation: CORRECT: Code obfuscation alters the malware code to avoid detection by signature-based antivirus. OPTION A: Port scanning is a network reconnaissance technique, not for evasion. OPTION B: Correct, as it modifies the code to avoid detection. OPTION C: Packet sniffing is used to capture network traffic, not for evasion. OPTION D: SQL injection is an attack vector, not an evasion technique.

Question 5

A malware analysis lab is set up to safely execute and study malware samples. Which specific setup ensures that malware cannot communicate with external servers during analysis?

A) Isolated virtual environment with internet access disabled

B) Dual-homed host configuration

C) Bridged network setup

D) Network Address Translation (NAT) enabled environment

Show Answer & Explanation

Correct Answer: A

Explanation: An isolated virtual environment with internet access disabled ensures that the malware cannot communicate with external servers. A dual-homed host and bridged network setup could still allow external communication. NAT environments can also permit external access depending on configuration.

Ready to Accelerate Your CEH - Certified Ethical Hacker Preparation?

Join thousands of professionals who are advancing their careers through expert certification preparation with FlashGenius.

  • ✅ Unlimited practice questions across all CEH - Certified Ethical Hacker domains
  • ✅ Full-length exam simulations with real-time scoring
  • ✅ AI-powered performance tracking and weak area identification
  • ✅ Personalized study plans with adaptive learning
  • ✅ Mobile-friendly platform for studying anywhere, anytime
  • ✅ Expert explanations and study resources
Start Free Practice Now

Already have an account? Sign in here

About CEH - Certified Ethical Hacker Certification

The CEH - Certified Ethical Hacker certification validates your expertise in malware threats and other critical domains. Our comprehensive practice questions are carefully crafted to mirror the actual exam experience and help you identify knowledge gaps before test day.

📘 Looking for the full study guide?
Check out our comprehensive guide: CEH Mock Exam Mastery: Practice Questions & Insights