Module 4

  1. How can you identify a jump statement within disassembled C code? What does look like?
  2. How is an ADS? What does it do?
  3. Why does malware work best when located within an HKEY?
  4. What are they ways hackers will use a DLL?
  5. What does the CreateThread do?
  6. How are COM’s identified?

answer 6 questions leave 2 blank