Search Results and Certificate Warnings
37 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which type of malware is concealed within the code of an executable process image stored as a file on disk?

  • Viruses (correct)
  • Worms
  • Trojans
  • Boot sector viruses
  • What method do boot sector viruses use to infect a computer?

  • They infect the boot sector code or partition table on a disk drive. (correct)
  • They are spread through email attachments.
  • They exploit vulnerabilities in web browsers.
  • They are concealed within an installer package for software.
  • What type of malware is concealed within an installer package for software that appears to be legitimate?

  • Worms
  • Viruses
  • Boot sector viruses
  • Trojans (correct)
  • Which of the following is a symptom of a security issue in the file system?

    <p>Changed file permissions (C)</p> Signup and view all the answers

    What is one technique that malware may use to trick users into installing it?

    <p>Misusing the push notification system (A)</p> Signup and view all the answers

    Which of the following is a common symptom of infection by spyware or adware?

    <p>Slow performance (C)</p> Signup and view all the answers

    What should you check if a user experiences redirection when entering URL web addresses manually?

    <p>DNS servers (A)</p> Signup and view all the answers

    Which one of the following is a key indicator of malware infection?

    <p>All of the above. (D)</p> Signup and view all the answers

    What is one example of crypto-ransomware mentioned in the text?

    <p>Cryptolocker (B)</p> Signup and view all the answers

    What is the purpose of ransomware payment methods such as wire transfer, cryptocurrency, or premium-rate phone lines?

    <p>To extort money from the victim (D)</p> Signup and view all the answers

    What is the difficulty of performing blockchain calculations necessary to generate a new digital coin related to?

    <p>The total number of coins within a cryptocurrency (D)</p> Signup and view all the answers

    Which type of malware can be harder to detect because it disguises itself as script instructions or a document file rather than an executable image file?

    <p>Fileless malware (C)</p> Signup and view all the answers

    What type of malware is usually designed to implement a backdoor, allowing the threat actor to access the PC and install additional malware tools?

    <p>Backdoors (A)</p> Signup and view all the answers

    Which type of malware can perform browser reconfigurations, monitor local application activity, and record keystrokes in an attempt to steal confidential information?

    <p>Spyware (A)</p> Signup and view all the answers

    What is a keylogger?

    <p>Malware that actively attempts to steal confidential information by recording keystrokes (C)</p> Signup and view all the answers

    Which of the following is a common cause of certificate warnings in web browsers?

    <p>The certificate is self-signed or issued by a trusted CA (A)</p> Signup and view all the answers

    What can a malicious proxy do if it successfully compromises the trusted root certificate store?

    <p>It can intercept and modify encrypted traffic (C)</p> Signup and view all the answers

    What is the purpose of antivirus vendors' malware encyclopedias?

    <p>To verify known malware indicators and behaviors (C)</p> Signup and view all the answers

    What is the primary method of malware discovery?

    <p>On-access scanning by an antivirus product (C)</p> Signup and view all the answers

    Which of the following is true about rootkits in Windows?

    <p>Rootkits can change any system file or programming interface. (B)</p> Signup and view all the answers

    What is the purpose of ransomware?

    <p>To extort money from the victim. (A)</p> Signup and view all the answers

    How can Trojans installed as regular software conceal their presence in Windows?

    <p>By using a filename similar to a genuine executable or library. (C)</p> Signup and view all the answers

    What does it mean for malware to run with SYSTEM privileges?

    <p>It can execute without requiring any authorization. (D)</p> Signup and view all the answers

    Which step should be taken after verifying symptoms of a malware infection?

    <p>Disconnect the network link (D)</p> Signup and view all the answers

    Which action reduces the risk of a privileged account being compromised by malware?

    <p>Quarantine the infected system (D)</p> Signup and view all the answers

    What should be done with removable media attached to an infected system?

    <p>Scan the removable media for malware (C)</p> Signup and view all the answers

    Why should System Restore and automated backup systems be disabled on an infected system?

    <p>To prevent the malware from accessing backups (C)</p> Signup and view all the answers

    Which of the following is the main tool recommended for remediation of an infected system?

    <p>Antivirus software (C)</p> Signup and view all the answers

    What is the purpose of continual threat/definition updates in antivirus software?

    <p>To block any attempt to open infected files (D)</p> Signup and view all the answers

    Which terms are synonymous when it comes to protecting against a broad range of threats?

    <p>Antivirus and anti-malware (A)</p> Signup and view all the answers

    Which of the following is NOT a topic that needs to be covered in security-awareness training?

    <p>Social engineering and malware threats (A)</p> Signup and view all the answers

    What is one method of malware discovery mentioned in the text?

    <p>Completing another antivirus scan (D)</p> Signup and view all the answers

    Why are untrained users susceptible to social engineering and phishing attacks?

    <p>They are not aware of common social engineering and malware threats (C)</p> Signup and view all the answers

    Which of the following tools can be used to terminate suspicious processes during the manual removal of advanced malware?

    <p>Task Manager (A)</p> Signup and view all the answers

    What is the recommended method to prevent reinfection after cleaning a system from malware?

    <p>Disable system restore (D)</p> Signup and view all the answers

    Which of the following actions is necessary to perform a complete system restore after a persistent malware infection?

    <p>Reinstall the operating system (D)</p> Signup and view all the answers

    What is the purpose of configuring scheduled scans for security software?

    <p>Prevent malware infection (B)</p> Signup and view all the answers

    More Like This

    Optimizing Search Results with Google
    17 questions
    Database Search Results Analysis
    4 questions
    Search Results Evaluation Quiz
    30 questions

    Search Results Evaluation Quiz

    EventfulSpessartine5411 avatar
    EventfulSpessartine5411
    Use Quizgecko on...
    Browser
    Browser