1. Which type of malware encrypts files and demands payment for decryption?
2. What is the main purpose of sandboxing in malware analysis?
3. Which malware analysis technique examines the malware without executing it?
4. A Trojan horse is dangerous mainly because it: