Cybersecurity Basics Quiz
20 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What characterizes a Trojan compared to a computer virus?

  • Trojans can only infect systems through physical access.
  • Trojans often disguise themselves as legitimate software. (correct)
  • Trojans exclusively target mobile operating systems.
  • Trojans replicate themselves to spread to other computers.

What is a common method by which a ransomware attack encrypts user data?

  • By corrupting the operating system completely.
  • By exploiting vulnerabilities in network security protocols.
  • By executing software that encrypts files on various drives. (correct)
  • By using a backdoor application to gain unauthorized access.

What does a keylogger spyware specifically aim to do?

  • Monitor network traffic for unusual activity.
  • Record keystrokes to capture sensitive information. (correct)
  • Override system security settings to access files.
  • Generate fake warnings about viruses on the system.

How does malware often use the email address book during infection?

<p>To spoof addresses and spread infected messages. (B)</p> Signup and view all the answers

What is one of the primary functions of worms in the context of computer viruses?

<p>To replicate by infecting other software without user action. (A)</p> Signup and view all the answers

What is the primary purpose of device hardening?

<p>To make devices more secure from exploits (D)</p> Signup and view all the answers

Which of the following is a recommended practice for securing devices regarding passwords?

<p>Implementing a strong and unique password for each device (D)</p> Signup and view all the answers

How does regularly applying patches and updates contribute to device security?

<p>They close potential vulnerabilities that malware can exploit (D)</p> Signup and view all the answers

What does disabling unused features on a device do?

<p>Reduces the potential attack surface for exploits (A)</p> Signup and view all the answers

Why is removing bloatware from new computers essential for device hardening?

<p>It reduces the risk of unnecessary vulnerabilities (A)</p> Signup and view all the answers

What is a zero day exploit?

<p>An infection mechanism that is unknown to antivirus and software vendors (B)</p> Signup and view all the answers

Which of the following methods is NOT recommended to reduce the risk of malware infection?

<p>Use untested software from unknown sources (A)</p> Signup and view all the answers

Which scanning method is typically used when a user accesses a file?

<p>On-access scanning (A)</p> Signup and view all the answers

What is the primary role of heuristic identification in antivirus software?

<p>To identify new malware based on behavior rather than pattern matching (B)</p> Signup and view all the answers

What is the effect of real-time (on-access) scanning on computer performance?

<p>It slightly reduces performance (C)</p> Signup and view all the answers

What should be the first action taken in case of a malware infection that propagates over networks?

<p>Disconnect the network link (C)</p> Signup and view all the answers

Which of the following statements about security patches is true?

<p>They can remediate known vulnerabilities in applications (D)</p> Signup and view all the answers

What is the primary function of anti-virus software?

<p>To detect malware and prevent its execution (B)</p> Signup and view all the answers

Which type of settings should be configured carefully to avoid performance issues with antivirus scanning?

<p>File types and exceptions for on-access scanning (A)</p> Signup and view all the answers

Which of the following vendors is NOT associated with antivirus software?

<p>Oracle (C)</p> Signup and view all the answers

Flashcards

Device Hardening

A set of policies to improve the security of computers and network devices.

Anti-Virus/Anti-Malware

Software to detect and prevent malicious software (malware) from harming a computer.

Patching/Updates

Keeping software, drivers, and firmware updated to fix vulnerabilities.

Default Passwords

Pre-set, easily guessed passwords often included in devices. These need changing immediately.

Signup and view all the flashcards

Disabling Unused Features

Turning off unnecessary features, services, or network protocols to minimize possible attack points.

Signup and view all the flashcards

Malware

Malicious software designed to harm or compromise computer systems.

Signup and view all the flashcards

Computer Viruses

Programs that replicate and spread across computers.

Signup and view all the flashcards

Trojan Horse

Malicious program disguised as legitimate software.

Signup and view all the flashcards

Spyware

Software that monitors user activity and sends the data to others.

Signup and view all the flashcards

Ransomware

Malware demanding payment to restore access.

Signup and view all the flashcards

Malware Infection Vector

The method by which malware enters a computer system.

Signup and view all the flashcards

Zero-Day Exploit

A previously unknown attack method that exploits vulnerabilities in software or systems.

Signup and view all the flashcards

Security Patch

A software update released to fix vulnerabilities and prevent exploits.

Signup and view all the flashcards

Anti-virus Definitions

Databases of known malware patterns used to identify and block threats.

Signup and view all the flashcards

Heuristic Identification

A method of malware detection using educated guesses about behavior, not just known signatures.

Signup and view all the flashcards

On-access Scanning

Anti-virus scanning that happens automatically as files are accessed.

Signup and view all the flashcards

Scheduled Scans

Anti-virus scans configured to run at specific times, often when the computer isn't in use.

Signup and view all the flashcards

Quarantine

The isolation of an infected file or program to prevent further damage without deleting it.

Signup and view all the flashcards

Administrative Privileges

High-level access rights that grant significant control over a system, requiring caution.

Signup and view all the flashcards

Windows Defender

Microsoft's built-in anti-virus and anti-malware protection for Windows systems.

Signup and view all the flashcards

More Like This

Cybersecurity Fundamentals Quiz
30 questions
Introduction to Cybersecurity
13 questions

Introduction to Cybersecurity

WarmheartedMoscovium5725 avatar
WarmheartedMoscovium5725
Cybersecurity Fundamentals
23 questions

Cybersecurity Fundamentals

LawAbidingChrysoprase3308 avatar
LawAbidingChrysoprase3308
Use Quizgecko on...
Browser
Browser