A company is experiencing an increasing number of systems that
are locking upon
Windows startup.
The security analyst clones a machine, enters into safe mode, and
discovers a file in the startup process
that runs Wstart.bat.
@echo off
asdhbawdhbasdhbawdhb
start notepad. exe
start notepad. exe
start calculator. exe
start calculator. exe
goto asdhbawdhbasdhbawdhb
Given the file contents and the system's issues, which of the
following types of malware is present?
A. Rootkit
B. Logic bomb
C. Worm
D. Virus
A computer forensics analyst collected a flash drive that
contained a single file with 500 pages
of text.
Which of the following algorithms should the analyst use to
validate the integrity of the file?
A. 3DES
B. AES
C. MD5
D. RSA
1) Given the file contents and the system's issues, which of the following types of malware is present?
Ans: B. Logic bomb
The script activates on startup thus that suggests that it is a
logic bomg. None of ther other answer are related to what is
happening here in the script:
2) Which of the following algorithms should the analyst use to validate the integrity of the file?
Ans: C. MD5
MD5 is used to verify data integrity and detect unintentional data corruption
AES is used for encryption. It is a symmetric block cypher ( blocks of text of size 128 bits are encrypted.
3DES is used to encypt data in transition and at rest in fields like payments, finace and other industries.
RSA used to make secured connection b/w VPN clients and VPN servers.
If you have any doubts, leave a comment below before rating. I'll happy to assist you further. Do upvote this if it helped you. Thank you
A company is experiencing an increasing number of systems that are locking upon Windows startup. The...