Podcast
Questions and Answers
Which type of malware is concealed within the code of an executable process image stored as a file on disk?
Which type of malware is concealed within the code of an executable process image stored as a file on disk?
What method do boot sector viruses use to infect a computer?
What method do boot sector viruses use to infect a computer?
What type of malware is concealed within an installer package for software that appears to be legitimate?
What type of malware is concealed within an installer package for software that appears to be legitimate?
Which of the following is a symptom of a security issue in the file system?
Which of the following is a symptom of a security issue in the file system?
Signup and view all the answers
What is one technique that malware may use to trick users into installing it?
What is one technique that malware may use to trick users into installing it?
Signup and view all the answers
Which of the following is a common symptom of infection by spyware or adware?
Which of the following is a common symptom of infection by spyware or adware?
Signup and view all the answers
What should you check if a user experiences redirection when entering URL web addresses manually?
What should you check if a user experiences redirection when entering URL web addresses manually?
Signup and view all the answers
Which one of the following is a key indicator of malware infection?
Which one of the following is a key indicator of malware infection?
Signup and view all the answers
What is one example of crypto-ransomware mentioned in the text?
What is one example of crypto-ransomware mentioned in the text?
Signup and view all the answers
What is the purpose of ransomware payment methods such as wire transfer, cryptocurrency, or premium-rate phone lines?
What is the purpose of ransomware payment methods such as wire transfer, cryptocurrency, or premium-rate phone lines?
Signup and view all the answers
What is the difficulty of performing blockchain calculations necessary to generate a new digital coin related to?
What is the difficulty of performing blockchain calculations necessary to generate a new digital coin related to?
Signup and view all the answers
Which type of malware can be harder to detect because it disguises itself as script instructions or a document file rather than an executable image file?
Which type of malware can be harder to detect because it disguises itself as script instructions or a document file rather than an executable image file?
Signup and view all the answers
What type of malware is usually designed to implement a backdoor, allowing the threat actor to access the PC and install additional malware tools?
What type of malware is usually designed to implement a backdoor, allowing the threat actor to access the PC and install additional malware tools?
Signup and view all the answers
Which type of malware can perform browser reconfigurations, monitor local application activity, and record keystrokes in an attempt to steal confidential information?
Which type of malware can perform browser reconfigurations, monitor local application activity, and record keystrokes in an attempt to steal confidential information?
Signup and view all the answers
What is a keylogger?
What is a keylogger?
Signup and view all the answers
Which of the following is a common cause of certificate warnings in web browsers?
Which of the following is a common cause of certificate warnings in web browsers?
Signup and view all the answers
What can a malicious proxy do if it successfully compromises the trusted root certificate store?
What can a malicious proxy do if it successfully compromises the trusted root certificate store?
Signup and view all the answers
What is the purpose of antivirus vendors' malware encyclopedias?
What is the purpose of antivirus vendors' malware encyclopedias?
Signup and view all the answers
What is the primary method of malware discovery?
What is the primary method of malware discovery?
Signup and view all the answers
Which of the following is true about rootkits in Windows?
Which of the following is true about rootkits in Windows?
Signup and view all the answers
What is the purpose of ransomware?
What is the purpose of ransomware?
Signup and view all the answers
How can Trojans installed as regular software conceal their presence in Windows?
How can Trojans installed as regular software conceal their presence in Windows?
Signup and view all the answers
What does it mean for malware to run with SYSTEM privileges?
What does it mean for malware to run with SYSTEM privileges?
Signup and view all the answers
Which step should be taken after verifying symptoms of a malware infection?
Which step should be taken after verifying symptoms of a malware infection?
Signup and view all the answers
Which action reduces the risk of a privileged account being compromised by malware?
Which action reduces the risk of a privileged account being compromised by malware?
Signup and view all the answers
What should be done with removable media attached to an infected system?
What should be done with removable media attached to an infected system?
Signup and view all the answers
Why should System Restore and automated backup systems be disabled on an infected system?
Why should System Restore and automated backup systems be disabled on an infected system?
Signup and view all the answers
Which of the following is the main tool recommended for remediation of an infected system?
Which of the following is the main tool recommended for remediation of an infected system?
Signup and view all the answers
What is the purpose of continual threat/definition updates in antivirus software?
What is the purpose of continual threat/definition updates in antivirus software?
Signup and view all the answers
Which terms are synonymous when it comes to protecting against a broad range of threats?
Which terms are synonymous when it comes to protecting against a broad range of threats?
Signup and view all the answers
Which of the following is NOT a topic that needs to be covered in security-awareness training?
Which of the following is NOT a topic that needs to be covered in security-awareness training?
Signup and view all the answers
What is one method of malware discovery mentioned in the text?
What is one method of malware discovery mentioned in the text?
Signup and view all the answers
Why are untrained users susceptible to social engineering and phishing attacks?
Why are untrained users susceptible to social engineering and phishing attacks?
Signup and view all the answers
Which of the following tools can be used to terminate suspicious processes during the manual removal of advanced malware?
Which of the following tools can be used to terminate suspicious processes during the manual removal of advanced malware?
Signup and view all the answers
What is the recommended method to prevent reinfection after cleaning a system from malware?
What is the recommended method to prevent reinfection after cleaning a system from malware?
Signup and view all the answers
Which of the following actions is necessary to perform a complete system restore after a persistent malware infection?
Which of the following actions is necessary to perform a complete system restore after a persistent malware infection?
Signup and view all the answers
What is the purpose of configuring scheduled scans for security software?
What is the purpose of configuring scheduled scans for security software?
Signup and view all the answers