당신은 온라인 연습 문제를 통해 GIAC GREM 시험지식에 대해 자신이 어떻게 알고 있는지 파악한 후 시험 참가 신청 여부를 결정할 수 있다.
시험을 100% 합격하고 시험 준비 시간을 35% 절약하기를 바라며 GREM 덤프 (최신 실제 시험 문제)를 사용 선택하여 현재 최신 172개의 시험 문제와 답을 포함하십시오.
/ 9
Question No : 1
What is the purpose of employing anti-disassembly techniques in malware?
정답:
Question No : 2
Which of the following indicators suggest the presence of .NET malware in a system? (Choose two)
정답:
Question No : 3
Which assembly instruction is commonly used to alter the flow of execution in malware?
정답:
Question No : 4
In reverse engineering .NET malware, what does dynamic analysis allow you to observe?
정답:
Question No : 5
Which API calls are commonly used by malware to manipulate processes and inject code? (Choose two)
정답:
Question No : 6
Which of the following is a common obfuscation technique used in .NET malware?
정답:
Question No : 7
Which of the following are common flow control instructions used in malware? (Choose two)
정답:
Question No : 8
You are analyzing a malware sample that appears to inject malicious code into the explorer.exe process. During execution, the malware creates a remote thread in explorer.exe and uses API calls to manipulate its memory.
How would you proceed with the analysis? (Choose three)
정답:
Question No : 9
What is the primary objective of conducting a static analysis on a suspected malware file?
정답:
Question No : 10
When using a debugger on .NET malware, what would be a primary reason to set a breakpoint at a specific method?
정답:
Question No : 11
When analyzing a Windows executable, which of the following indicators most strongly suggests that the file is packed?
정답:
Question No : 12
What is a key indicator that JavaScript code has been obfuscated?
정답:
Question No : 13
API hooking implemented by malware is primarily used for which purpose?
정답:
Question No : 14
What is the primary reason attackers pack malware binaries?
정답:
Question No : 15
What is a common indicator that a function in assembly language is about to return a value?