🔥 40% Off Crucial Exams Memberships — Deal ends today!

1 hour, 59 minutes remaining!

Certified Ethical Hacker (CEH) Practice Question

While dynamically analyzing a Windows malware dropper, you observe that it spawns svchost.exe in a suspended state, calls NtUnmapViewOfSection to remove the original executable image, writes its own PE image into the hollowed address space, fixes the thread context, and finally resumes the process. Which code-injection technique is being demonstrated?

  • Reflective DLL injection

  • DLL search-order hijacking

  • Process hollowing (RunPE-style replacement)

  • QueueUserAPC remote code injection

Certified Ethical Hacker (CEH)
System Hacking Phases and Attack Techniques
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot