Search Results and Certificate Warnings

BriskWhite avatar
BriskWhite
·
·
Download

Start Quiz

37 Questions

Which type of malware is concealed within the code of an executable process image stored as a file on disk?

Viruses

What method do boot sector viruses use to infect a computer?

They infect the boot sector code or partition table on a disk drive.

What type of malware is concealed within an installer package for software that appears to be legitimate?

Trojans

Which of the following is a symptom of a security issue in the file system?

Changed file permissions

What is one technique that malware may use to trick users into installing it?

Misusing the push notification system

Which of the following is a common symptom of infection by spyware or adware?

Slow performance

What should you check if a user experiences redirection when entering URL web addresses manually?

DNS servers

Which one of the following is a key indicator of malware infection?

All of the above.

What is one example of crypto-ransomware mentioned in the text?

Cryptolocker

What is the purpose of ransomware payment methods such as wire transfer, cryptocurrency, or premium-rate phone lines?

To extort money from the victim

What is the difficulty of performing blockchain calculations necessary to generate a new digital coin related to?

The total number of coins within a cryptocurrency

Which type of malware can be harder to detect because it disguises itself as script instructions or a document file rather than an executable image file?

Fileless malware

What type of malware is usually designed to implement a backdoor, allowing the threat actor to access the PC and install additional malware tools?

Backdoors

Which type of malware can perform browser reconfigurations, monitor local application activity, and record keystrokes in an attempt to steal confidential information?

Spyware

What is a keylogger?

Malware that actively attempts to steal confidential information by recording keystrokes

Which of the following is a common cause of certificate warnings in web browsers?

The certificate is self-signed or issued by a trusted CA

What can a malicious proxy do if it successfully compromises the trusted root certificate store?

It can intercept and modify encrypted traffic

What is the purpose of antivirus vendors' malware encyclopedias?

To verify known malware indicators and behaviors

What is the primary method of malware discovery?

On-access scanning by an antivirus product

Which of the following is true about rootkits in Windows?

Rootkits can change any system file or programming interface.

What is the purpose of ransomware?

To extort money from the victim.

How can Trojans installed as regular software conceal their presence in Windows?

By using a filename similar to a genuine executable or library.

What does it mean for malware to run with SYSTEM privileges?

It can execute without requiring any authorization.

Which step should be taken after verifying symptoms of a malware infection?

Disconnect the network link

Which action reduces the risk of a privileged account being compromised by malware?

Quarantine the infected system

What should be done with removable media attached to an infected system?

Scan the removable media for malware

Why should System Restore and automated backup systems be disabled on an infected system?

To prevent the malware from accessing backups

Which of the following is the main tool recommended for remediation of an infected system?

Antivirus software

What is the purpose of continual threat/definition updates in antivirus software?

To block any attempt to open infected files

Which terms are synonymous when it comes to protecting against a broad range of threats?

Antivirus and anti-malware

Which of the following is NOT a topic that needs to be covered in security-awareness training?

Social engineering and malware threats

What is one method of malware discovery mentioned in the text?

Completing another antivirus scan

Why are untrained users susceptible to social engineering and phishing attacks?

They are not aware of common social engineering and malware threats

Which of the following tools can be used to terminate suspicious processes during the manual removal of advanced malware?

Task Manager

What is the recommended method to prevent reinfection after cleaning a system from malware?

Disable system restore

Which of the following actions is necessary to perform a complete system restore after a persistent malware infection?

Reinstall the operating system

What is the purpose of configuring scheduled scans for security software?

Prevent malware infection

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Optimizing Search Results with Google
17 questions
Database Search Results Analysis
4 questions
Use Quizgecko on...
Browser
Browser