- How can you identify a jump statement within disassembled C code? What does look like?
- How is an ADS? What does it do?
- Why does malware work best when located within an HKEY?
- What are they ways hackers will use a DLL?
- What does the CreateThread do?
- How are COM’s identified?
answer 6 questions leave 2 blank