New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM CPEH-001 Exam - Topic 6 Question 20 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 20
Topic #: 6
[All CPEH-001 Questions]

What type of attack changes its signature and/or payload to avoid detection by antivirus programs?

Show Suggested Answer Hide Answer
Suggested Answer: A

In computer terminology, polymorphic code is code that mutates while keeping the original algorithm intact. This technique is sometimes used by computer viruses, shellcodes and computer worms to hide their presence.


Contribute your Thoughts:

0/2000 characters
Gearldine
4 months ago
I thought boot sector attacks were more common?
upvoted 0 times
...
Rikki
4 months ago
Polymorphic attacks are sneaky for sure!
upvoted 0 times
...
Ryann
4 months ago
Wait, are we sure it's not rootkits?
upvoted 0 times
...
Jesusita
4 months ago
Agreed, polymorphic is the right term here!
upvoted 0 times
...
Kimbery
5 months ago
It's definitely polymorphic attacks that change their signature.
upvoted 0 times
...
Svetlana
5 months ago
I thought boot sector attacks were more about infecting the system at startup, not really about changing signatures.
upvoted 0 times
...
Alaine
5 months ago
I practiced a question similar to this, and I believe polymorphic attacks were specifically designed to change their signatures.
upvoted 0 times
...
Brande
5 months ago
I'm not entirely sure, but I feel like rootkits could also be involved in hiding their presence.
upvoted 0 times
...
Ngoc
5 months ago
I think the answer might be A, polymorphic. I remember studying how these types of malware change to evade detection.
upvoted 0 times
...
Laila
5 months ago
Hmm, I'm a bit unsure about this one. There are a few options presented, and I'm not sure which one is the best approach. I'll need to think it through carefully.
upvoted 0 times
...
Fletcher
5 months ago
Hmm, this one seems tricky. I'll need to think through the FMA services and their database connections carefully.
upvoted 0 times
...
Shalon
5 months ago
Hmm, I'm not sure about this one. I'll have to think it through carefully.
upvoted 0 times
...

Save Cancel