Podcast
Questions and Answers
What characterizes a Trojan compared to a computer virus?
What is a common method by which a ransomware attack encrypts user data?
What does a keylogger spyware specifically aim to do?
How does malware often use the email address book during infection?
Signup and view all the answers
What is one of the primary functions of worms in the context of computer viruses?
Signup and view all the answers
What is the primary purpose of device hardening?
Signup and view all the answers
Which of the following is a recommended practice for securing devices regarding passwords?
Signup and view all the answers
How does regularly applying patches and updates contribute to device security?
Signup and view all the answers
What does disabling unused features on a device do?
Signup and view all the answers
Why is removing bloatware from new computers essential for device hardening?
Signup and view all the answers
What is a zero day exploit?
Signup and view all the answers
Which of the following methods is NOT recommended to reduce the risk of malware infection?
Signup and view all the answers
Which scanning method is typically used when a user accesses a file?
Signup and view all the answers
What is the primary role of heuristic identification in antivirus software?
Signup and view all the answers
What is the effect of real-time (on-access) scanning on computer performance?
Signup and view all the answers
What should be the first action taken in case of a malware infection that propagates over networks?
Signup and view all the answers
Which of the following statements about security patches is true?
Signup and view all the answers
What is the primary function of anti-virus software?
Signup and view all the answers
Which type of settings should be configured carefully to avoid performance issues with antivirus scanning?
Signup and view all the answers
Which of the following vendors is NOT associated with antivirus software?
Signup and view all the answers