Computer Security Quiz
20 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary method through which computer viruses replicate and spread?

  • By exploiting social engineering tactics in email communications
  • By encrypting user files to launch a ransom demand
  • By altering system settings to allow malicious downloads
  • By inserting themselves into executable programs or scripts (correct)

What is a primary characteristic that distinguishes Trojans from computer viruses?

  • Trojans replicate independently without user intervention
  • Trojans only exist as email attachments
  • Trojans disguise themselves as legitimate programs (correct)
  • Trojans are more easily detected by antivirus software

Which of the following statements about ransomware is accurate?

  • All ransomware attacks are easy to fix
  • Ransomware requires users to pay with credit cards only
  • Ransomware may encrypt files and demand payment to restore access (correct)
  • Ransomware exclusively targets only operating systems

What function do keyloggers serve as a type of spyware?

<p>They record users' keystrokes to capture sensitive information (D)</p> Signup and view all the answers

What measure can help prevent malware infections when using removable media?

<p>Do not run untrusted programs from removable media (A)</p> Signup and view all the answers

What is the purpose of device hardening?

<p>To make devices more secure (C)</p> Signup and view all the answers

Why is enabling passwords on devices important?

<p>It protects against unauthorized access in case of theft (A)</p> Signup and view all the answers

Which of the following is a consequence of having default or weak passwords on network devices?

<p>Higher vulnerability to unauthorized access (A)</p> Signup and view all the answers

What should be done with features, services, or protocols that are not being used on a device?

<p>They should be disabled to reduce the attack surface (A)</p> Signup and view all the answers

What is meant by 'removing unwanted/unnecessary software' during device hardening?

<p>To streamline the operating environment and improve security (D)</p> Signup and view all the answers

What is the primary function of anti-virus software?

<p>To detect malware and prevent it from executing (B)</p> Signup and view all the answers

What does 'on-access scanning' do?

<p>Scans files when they are accessed and blocks suspicious ones (D)</p> Signup and view all the answers

Which of the following best describes a zero-day exploit?

<p>An infection method that is unknown to software vendors (C)</p> Signup and view all the answers

What should be done first if a system is suspected to be infected with malware?

<p>Disconnect the network link (C)</p> Signup and view all the answers

Which action can anti-virus software NOT typically perform when it detects malware?

<p>Automatically upgrade the operating system (B)</p> Signup and view all the answers

What is a potential downside of real-time scanning in anti-virus software?

<p>It can cause slower system performance (D)</p> Signup and view all the answers

Which of the following steps is NOT recommended to reduce malware infection risk?

<p>Visiting unsavory websites with no security measures (C)</p> Signup and view all the answers

Which function do heuristic techniques in anti-virus software serve?

<p>Analyzes file behavior to identify suspicious activity (B)</p> Signup and view all the answers

What type of scanning inspects more file types than on-access scanning when run?

<p>Scheduled scans (B)</p> Signup and view all the answers

Which of these is a critical feature of Windows Defender in Windows 10?

<p>It integrates malware protection with firewall settings (B)</p> Signup and view all the answers

Flashcards

Device Hardening

A set of policies to secure mobile devices, workstations, and network appliances by implementing security measures.

Anti-virus/Anti-malware

Software that detects and prevents malicious software (malware) from running on a device.

Patching/Updates

Keeping operating systems, drivers, and firmware up-to-date to reduce vulnerabilities to malware.

Strong Passwords

Complex passwords that are difficult to guess or crack, making devices less vulnerable to unauthorized access.

Signup and view all the flashcards

Disabling Unused Features

Reducing the attack surface by turning off unnecessary network protocols, services, or administrations interfaces on a device.

Signup and view all the flashcards

Malware

Harmful software designed to damage or compromise computer systems.

Signup and view all the flashcards

Computer Virus

Software that replicates itself and spreads to other computers.

Signup and view all the flashcards

Trojan

Malicious software disguised as a harmless program; often delivers harmful payloads.

Signup and view all the flashcards

Ransomware

Malware that encrypts data and demands payment for its recovery.

Signup and view all the flashcards

Spyware

Software that secretly monitors user activity and sends information to others.

Signup and view all the flashcards

Malware Infection Vector

The method by which malware infects a computer.

Signup and view all the flashcards

Zero-Day Exploit

A malware attack mechanism unknown to software and antivirus vendors.

Signup and view all the flashcards

Security Patch

Software update to fix vulnerabilities.

Signup and view all the flashcards

Antivirus Software

Software designed to detect and prevent malware execution.

Signup and view all the flashcards

On-Access Scanning

Antivirus scanning of files as they are accessed.

Signup and view all the flashcards

Scheduled Scans

Antivirus scans run at specific times.

Signup and view all the flashcards

Quarantine (malware)

Separating infected files to prevent further spread.

Signup and view all the flashcards

Vulnerability

A flaw in software allowing security bypass or crashing.

Signup and view all the flashcards

Windows Defender

Microsoft's integrated antivirus/antimalware for Windows.

Signup and view all the flashcards

Heuristic Identification

Antivirus technique using knowledge of typical malware behavior.

Signup and view all the flashcards

More Like This

Use Quizgecko on...
Browser
Browser