Malware quiz gggfg PDF

Title Malware quiz gggfg
Author Anonymous User
Course IT Technician
Institution Liverpool Hope University
Pages 6
File Size 152.9 KB
File Type PDF
Total Downloads 13
Total Views 148

Summary

A quick malware quiz to test your knowledge...


Description

6

CompTIA A+ Exam 220-1002 Malware Quiz Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as: 

Adware

  

Malware ( Your answer) Ransomware Spyware You correctly answered this question.

Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as: 

Grayware

  

Adware Ransomware ( Your answer) Spyware You correctly answered this question.

Which of the following terms refers to an example of crypto-malware? 

Backdoor

  

Ransomware ( Your answer) Keylogger Rootkit You correctly answered this question.

A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of. 

True ( Your answer)



False You correctly answered this question.

Which of the following is an example of spyware?



Keylogger ( Your answer)

  

Vulnerability scanner Computer worm Packet sniffer You correctly answered this question.

A collection of software tools used by a hacker to mask intrusion and obtain administratorlevel access to a computer or computer network is known as: 

Rootkit ( Your answer)

  

Spyware Backdoor Trojan You correctly answered this question.

Which of the following statements apply to the definition of a computer virus? (Select 3 answers) 

A self-replicating computer program containing malicious segment ( Your answer)

    

Requires its host application to be run to make the virus active ( Missed) A standalone malicious computer program that replicates itself over a computer network Can run by itself without any interaction ( Your answer) Attaches itself to an application program or other executable component ( Missed) A self-contained malicious program or code that does need a host to propagate itself ( Your answer) Your answer to this question is incorrect or incomplete.

A malware-infected networked host under remote control of a hacker is commonly referred to as a: 

Trojan

  

Worm Bot ( Your answer) Honeypot You correctly answered this question.

Which of the following terms is used to describe a collection of intermediary compromised systems that are used as a platform for a DDoS attack? 

Honeynet

  

Botnet ( Your answer) Quarantine network Malware You correctly answered this question.

What is the name of a standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth? 

Spyware

  

Worm ( Your answer) Trojan Spam You correctly answered this question.

Malicious software collecting information about users without their knowledge/consent is known as: 

Crypto-malware

  

Adware Ransomware Spyware ( Your answer) You correctly answered this question.

Which of the following enables troubleshooting a malware-infected system that doesn't boot up? 

Anti-malware application

  

Recovery console ( Your answer) AV software Backup/restore options You correctly answered this question.

Which of the following methods can be used to launch Windows Recovery Environment (WinRE) in Windows 8/8.1/10? 

Boot from installation media

   

In Power menu, hold down the Shift key and select Restart Boot from Recovery Drive Perform system restart from the Settings menu All of the above ( Your answer) You correctly answered this question.

Restoring the entire system from a known good backup copy is the most reliable method for effective malware removal. 

True ( Missed)



False ( Your answer) Your answer to this question is incorrect or incomplete.

Which of the following would be the best malware-prevention method/tool? 

An up-to-date antivirus application

   

Software firewall An up-to-date anti-malware application ( Your answer) End user education ( Missed) System restore from a known good backup Your answer to this question is incorrect or incomplete.

The term "Unified Threat Management" (UTM) refers to a network security solution, commonly in the form of a dedicated device (called a UTM appliance or a web security gateway), which combines the functionality of a firewall with additional safeguards such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS functionality, or malware inspection. 

True ( Your answer)



False You correctly answered this question.

Which of the following can be used by system administrators to selectively block access to known malware sites? 

DHCP settings

  

DNS configuration ( Missed) Port security ( Your answer) DLP software Your answer to this question is incorrect or incomplete.

According to the CompTIA's best practice procedures for malware removal, putting a malware-infected Windows-based system into a quarantine should be the next step after: 

Creating a restore point



Identifying and researching malware symptoms ( Missed)

 

Disabling System Restore ( Your answer) Updating the anti-malware software Your answer to this question is incorrect or incomplete.

According to the CompTIA's best practice procedures for malware removal, disabling System Restore on a malware-infected Windows-based system should be performed as the next step after: 

Isolating the infected system ( Your answer)

  

Removing malware from the infected system Identifying and researching malware symptoms Scheduling scans and running updates You correctly answered this question.

Which of the following locations in MS Windows provide access to an interface containing options for configuring restore settings, managing disk space, and deleting restore points? (Select 2 answers) 

Control Panel (Icon view) -> Security and Maintenance -> Change Security and Maintenance Settings -> System Protection -> Configure...



Windows Run dialog box -> type in sysdm.cpl + press Enter -> System Protection -> Configure... ( Missed) Control Panel (Icon view) -> Recovery -> Configure System Restore -> Configure... ( Missed) Windows Run dialog box -> type in wscui.cpl + press Enter -> Change Security and Maintenance Settings -> System Protection -> Configure... ( Your answer) Control Panel (Category view) -> System and Security -> Configure System Restore -> Configure... ( Your answer)

  

Your answer to this question is incorrect or incomplete.

According to the CompTIA's best practice procedures for malware removal, removing malicious software on a Windows-based system should be performed as the next step after: 

Disabling System Restore ( Missed)

  

Isolating the infected system Scheduling scans and running updates ( Your answer) Creating a restore point Your answer to this question is incorrect or incomplete.

According to the CompTIA's best practice procedures for malware removal, scheduling scans and running updates on a Windows-based system should be performed as the next step after: 

Enabling System Restore

  

Isolating the infected system ( Your answer) Removing malware from the system ( Missed) Creating a restore point Your answer to this question is incorrect or incomplete.

According to the CompTIA's best practice procedures for malware removal, enabling System Restore and creating a restore point in Windows should be performed as the next step after: 

Removing malware from the system

  

Scheduling scans and running updates ( Missed) Identifying and researching malware symptoms ( Your answer) Isolating the infected system Your answer to this question is incorrect or incomplete.

According to the CompTIA's best practice procedures for malware removal, user education should be the final step of the malware removal process. 

True ( Your answer)



False You correctly answered this question....


Similar Free PDFs