Podcast
Questions and Answers
What is the primary method through which computer viruses replicate and spread?
What is the primary method through which computer viruses replicate and spread?
What is a primary characteristic that distinguishes Trojans from computer viruses?
What is a primary characteristic that distinguishes Trojans from computer viruses?
Which of the following statements about ransomware is accurate?
Which of the following statements about ransomware is accurate?
What function do keyloggers serve as a type of spyware?
What function do keyloggers serve as a type of spyware?
Signup and view all the answers
What measure can help prevent malware infections when using removable media?
What measure can help prevent malware infections when using removable media?
Signup and view all the answers
What is the purpose of device hardening?
What is the purpose of device hardening?
Signup and view all the answers
Why is enabling passwords on devices important?
Why is enabling passwords on devices important?
Signup and view all the answers
Which of the following is a consequence of having default or weak passwords on network devices?
Which of the following is a consequence of having default or weak passwords on network devices?
Signup and view all the answers
What should be done with features, services, or protocols that are not being used on a device?
What should be done with features, services, or protocols that are not being used on a device?
Signup and view all the answers
What is meant by 'removing unwanted/unnecessary software' during device hardening?
What is meant by 'removing unwanted/unnecessary software' during device hardening?
Signup and view all the answers
What is the primary function of anti-virus software?
What is the primary function of anti-virus software?
Signup and view all the answers
What does 'on-access scanning' do?
What does 'on-access scanning' do?
Signup and view all the answers
Which of the following best describes a zero-day exploit?
Which of the following best describes a zero-day exploit?
Signup and view all the answers
What should be done first if a system is suspected to be infected with malware?
What should be done first if a system is suspected to be infected with malware?
Signup and view all the answers
Which action can anti-virus software NOT typically perform when it detects malware?
Which action can anti-virus software NOT typically perform when it detects malware?
Signup and view all the answers
What is a potential downside of real-time scanning in anti-virus software?
What is a potential downside of real-time scanning in anti-virus software?
Signup and view all the answers
Which of the following steps is NOT recommended to reduce malware infection risk?
Which of the following steps is NOT recommended to reduce malware infection risk?
Signup and view all the answers
Which function do heuristic techniques in anti-virus software serve?
Which function do heuristic techniques in anti-virus software serve?
Signup and view all the answers
What type of scanning inspects more file types than on-access scanning when run?
What type of scanning inspects more file types than on-access scanning when run?
Signup and view all the answers
Which of these is a critical feature of Windows Defender in Windows 10?
Which of these is a critical feature of Windows Defender in Windows 10?
Signup and view all the answers