Cybersecurity Basics Quiz
20 Questions
0 Views

Cybersecurity Basics Quiz

Created by
@RestfulCanyon

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What characterizes a Trojan compared to a computer virus?

  • Trojans can only infect systems through physical access.
  • Trojans often disguise themselves as legitimate software. (correct)
  • Trojans exclusively target mobile operating systems.
  • Trojans replicate themselves to spread to other computers.
  • What is a common method by which a ransomware attack encrypts user data?

  • By corrupting the operating system completely.
  • By exploiting vulnerabilities in network security protocols.
  • By executing software that encrypts files on various drives. (correct)
  • By using a backdoor application to gain unauthorized access.
  • What does a keylogger spyware specifically aim to do?

  • Monitor network traffic for unusual activity.
  • Record keystrokes to capture sensitive information. (correct)
  • Override system security settings to access files.
  • Generate fake warnings about viruses on the system.
  • How does malware often use the email address book during infection?

    <p>To spoof addresses and spread infected messages.</p> Signup and view all the answers

    What is one of the primary functions of worms in the context of computer viruses?

    <p>To replicate by infecting other software without user action.</p> Signup and view all the answers

    What is the primary purpose of device hardening?

    <p>To make devices more secure from exploits</p> Signup and view all the answers

    Which of the following is a recommended practice for securing devices regarding passwords?

    <p>Implementing a strong and unique password for each device</p> Signup and view all the answers

    How does regularly applying patches and updates contribute to device security?

    <p>They close potential vulnerabilities that malware can exploit</p> Signup and view all the answers

    What does disabling unused features on a device do?

    <p>Reduces the potential attack surface for exploits</p> Signup and view all the answers

    Why is removing bloatware from new computers essential for device hardening?

    <p>It reduces the risk of unnecessary vulnerabilities</p> Signup and view all the answers

    What is a zero day exploit?

    <p>An infection mechanism that is unknown to antivirus and software vendors</p> Signup and view all the answers

    Which of the following methods is NOT recommended to reduce the risk of malware infection?

    <p>Use untested software from unknown sources</p> Signup and view all the answers

    Which scanning method is typically used when a user accesses a file?

    <p>On-access scanning</p> Signup and view all the answers

    What is the primary role of heuristic identification in antivirus software?

    <p>To identify new malware based on behavior rather than pattern matching</p> Signup and view all the answers

    What is the effect of real-time (on-access) scanning on computer performance?

    <p>It slightly reduces performance</p> Signup and view all the answers

    What should be the first action taken in case of a malware infection that propagates over networks?

    <p>Disconnect the network link</p> Signup and view all the answers

    Which of the following statements about security patches is true?

    <p>They can remediate known vulnerabilities in applications</p> Signup and view all the answers

    What is the primary function of anti-virus software?

    <p>To detect malware and prevent its execution</p> Signup and view all the answers

    Which type of settings should be configured carefully to avoid performance issues with antivirus scanning?

    <p>File types and exceptions for on-access scanning</p> Signup and view all the answers

    Which of the following vendors is NOT associated with antivirus software?

    <p>Oracle</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser