Computer Security Quiz
20 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary method through which computer viruses replicate and spread?

  • By exploiting social engineering tactics in email communications
  • By encrypting user files to launch a ransom demand
  • By altering system settings to allow malicious downloads
  • By inserting themselves into executable programs or scripts (correct)
  • What is a primary characteristic that distinguishes Trojans from computer viruses?

  • Trojans replicate independently without user intervention
  • Trojans only exist as email attachments
  • Trojans disguise themselves as legitimate programs (correct)
  • Trojans are more easily detected by antivirus software
  • Which of the following statements about ransomware is accurate?

  • All ransomware attacks are easy to fix
  • Ransomware requires users to pay with credit cards only
  • Ransomware may encrypt files and demand payment to restore access (correct)
  • Ransomware exclusively targets only operating systems
  • What function do keyloggers serve as a type of spyware?

    <p>They record users' keystrokes to capture sensitive information</p> Signup and view all the answers

    What measure can help prevent malware infections when using removable media?

    <p>Do not run untrusted programs from removable media</p> Signup and view all the answers

    What is the purpose of device hardening?

    <p>To make devices more secure</p> Signup and view all the answers

    Why is enabling passwords on devices important?

    <p>It protects against unauthorized access in case of theft</p> Signup and view all the answers

    Which of the following is a consequence of having default or weak passwords on network devices?

    <p>Higher vulnerability to unauthorized access</p> Signup and view all the answers

    What should be done with features, services, or protocols that are not being used on a device?

    <p>They should be disabled to reduce the attack surface</p> Signup and view all the answers

    What is meant by 'removing unwanted/unnecessary software' during device hardening?

    <p>To streamline the operating environment and improve security</p> Signup and view all the answers

    What is the primary function of anti-virus software?

    <p>To detect malware and prevent it from executing</p> Signup and view all the answers

    What does 'on-access scanning' do?

    <p>Scans files when they are accessed and blocks suspicious ones</p> Signup and view all the answers

    Which of the following best describes a zero-day exploit?

    <p>An infection method that is unknown to software vendors</p> Signup and view all the answers

    What should be done first if a system is suspected to be infected with malware?

    <p>Disconnect the network link</p> Signup and view all the answers

    Which action can anti-virus software NOT typically perform when it detects malware?

    <p>Automatically upgrade the operating system</p> Signup and view all the answers

    What is a potential downside of real-time scanning in anti-virus software?

    <p>It can cause slower system performance</p> Signup and view all the answers

    Which of the following steps is NOT recommended to reduce malware infection risk?

    <p>Visiting unsavory websites with no security measures</p> Signup and view all the answers

    Which function do heuristic techniques in anti-virus software serve?

    <p>Analyzes file behavior to identify suspicious activity</p> Signup and view all the answers

    What type of scanning inspects more file types than on-access scanning when run?

    <p>Scheduled scans</p> Signup and view all the answers

    Which of these is a critical feature of Windows Defender in Windows 10?

    <p>It integrates malware protection with firewall settings</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser