Search Results and Certificate Warnings
37 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which type of malware is concealed within the code of an executable process image stored as a file on disk?

  • Viruses (correct)
  • Worms
  • Trojans
  • Boot sector viruses
  • What method do boot sector viruses use to infect a computer?

  • They infect the boot sector code or partition table on a disk drive. (correct)
  • They are spread through email attachments.
  • They exploit vulnerabilities in web browsers.
  • They are concealed within an installer package for software.
  • What type of malware is concealed within an installer package for software that appears to be legitimate?

  • Worms
  • Viruses
  • Boot sector viruses
  • Trojans (correct)
  • Which of the following is a symptom of a security issue in the file system?

    <p>Changed file permissions</p> Signup and view all the answers

    What is one technique that malware may use to trick users into installing it?

    <p>Misusing the push notification system</p> Signup and view all the answers

    Which of the following is a common symptom of infection by spyware or adware?

    <p>Slow performance</p> Signup and view all the answers

    What should you check if a user experiences redirection when entering URL web addresses manually?

    <p>DNS servers</p> Signup and view all the answers

    Which one of the following is a key indicator of malware infection?

    <p>All of the above.</p> Signup and view all the answers

    What is one example of crypto-ransomware mentioned in the text?

    <p>Cryptolocker</p> Signup and view all the answers

    What is the purpose of ransomware payment methods such as wire transfer, cryptocurrency, or premium-rate phone lines?

    <p>To extort money from the victim</p> Signup and view all the answers

    What is the difficulty of performing blockchain calculations necessary to generate a new digital coin related to?

    <p>The total number of coins within a cryptocurrency</p> Signup and view all the answers

    Which type of malware can be harder to detect because it disguises itself as script instructions or a document file rather than an executable image file?

    <p>Fileless malware</p> Signup and view all the answers

    What type of malware is usually designed to implement a backdoor, allowing the threat actor to access the PC and install additional malware tools?

    <p>Backdoors</p> Signup and view all the answers

    Which type of malware can perform browser reconfigurations, monitor local application activity, and record keystrokes in an attempt to steal confidential information?

    <p>Spyware</p> Signup and view all the answers

    What is a keylogger?

    <p>Malware that actively attempts to steal confidential information by recording keystrokes</p> Signup and view all the answers

    Which of the following is a common cause of certificate warnings in web browsers?

    <p>The certificate is self-signed or issued by a trusted CA</p> Signup and view all the answers

    What can a malicious proxy do if it successfully compromises the trusted root certificate store?

    <p>It can intercept and modify encrypted traffic</p> Signup and view all the answers

    What is the purpose of antivirus vendors' malware encyclopedias?

    <p>To verify known malware indicators and behaviors</p> Signup and view all the answers

    What is the primary method of malware discovery?

    <p>On-access scanning by an antivirus product</p> Signup and view all the answers

    Which of the following is true about rootkits in Windows?

    <p>Rootkits can change any system file or programming interface.</p> Signup and view all the answers

    What is the purpose of ransomware?

    <p>To extort money from the victim.</p> Signup and view all the answers

    How can Trojans installed as regular software conceal their presence in Windows?

    <p>By using a filename similar to a genuine executable or library.</p> Signup and view all the answers

    What does it mean for malware to run with SYSTEM privileges?

    <p>It can execute without requiring any authorization.</p> Signup and view all the answers

    Which step should be taken after verifying symptoms of a malware infection?

    <p>Disconnect the network link</p> Signup and view all the answers

    Which action reduces the risk of a privileged account being compromised by malware?

    <p>Quarantine the infected system</p> Signup and view all the answers

    What should be done with removable media attached to an infected system?

    <p>Scan the removable media for malware</p> Signup and view all the answers

    Why should System Restore and automated backup systems be disabled on an infected system?

    <p>To prevent the malware from accessing backups</p> Signup and view all the answers

    Which of the following is the main tool recommended for remediation of an infected system?

    <p>Antivirus software</p> Signup and view all the answers

    What is the purpose of continual threat/definition updates in antivirus software?

    <p>To block any attempt to open infected files</p> Signup and view all the answers

    Which terms are synonymous when it comes to protecting against a broad range of threats?

    <p>Antivirus and anti-malware</p> Signup and view all the answers

    Which of the following is NOT a topic that needs to be covered in security-awareness training?

    <p>Social engineering and malware threats</p> Signup and view all the answers

    What is one method of malware discovery mentioned in the text?

    <p>Completing another antivirus scan</p> Signup and view all the answers

    Why are untrained users susceptible to social engineering and phishing attacks?

    <p>They are not aware of common social engineering and malware threats</p> Signup and view all the answers

    Which of the following tools can be used to terminate suspicious processes during the manual removal of advanced malware?

    <p>Task Manager</p> Signup and view all the answers

    What is the recommended method to prevent reinfection after cleaning a system from malware?

    <p>Disable system restore</p> Signup and view all the answers

    Which of the following actions is necessary to perform a complete system restore after a persistent malware infection?

    <p>Reinstall the operating system</p> Signup and view all the answers

    What is the purpose of configuring scheduled scans for security software?

    <p>Prevent malware infection</p> Signup and view all the answers

    More Like This

    Optimizing Search Results with Google
    17 questions
    Database Search Results Analysis
    4 questions
    Use Quizgecko on...
    Browser
    Browser