Register
5:00
Stop
CEH - Malware Threats - Malware Concepts
Advanced
1/5
Which technique is used by fileless malware to evade detection?
a.
Encrypting its code with a different key each infection
b.
Residing in system memory and using legitimate tools
c.
Hiding malicious code inside legitimate-looking documents that execute when opened
d.
Modifying its hash values while maintaining the same functionality
Advanced