13.6.10 Practice Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is a cookie?

A file saved on your hard drive that tracks website preferences and use.

While browsing the internet, you notice that your browser displays pop-ups containing advertisements that are related to recent keyword searches yo have performed. What is this an example of?

Adware

A user reports that his machine will no longer boot properly. After asking several questions to determine the problem, you suspect the user unknowingly downloaded malware from the internet, and that the malware corrupted the boot block. Based on your suspicions, which of the following actions would you MOST likely take to correct the problem? (Select TWO)

Boot from the Windows installation DVD and use the Recovery Environment to run a startup repair. Reimage the machine.

Your anti-malware software has detected a virus on your Windows 10 system. However, the anti-malware software is unable to remove it. When you try to delete the files, you can't because they are in use. Which of the following actions would be BEST to try first?

Boot into Safe Mode and try removing the malware.

You have recently had an issue where a user's Windows computer was infected with a virus. After removing the virus from the computer, which of the following is the NEXT step you should take?

Install all OS updates

You have installed anti-malware software that checks for viruses in e-mail attachments. You configure the software to quarantine any files with problems. You receive an email with an important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the anti-malware software/ Which of the following BEST describes what happened to the file?

It has been moved to a folder on your computer.

Which of the following best describes spyware?

It monitors the actions you take on your machine and sends the information back to its originating source.

What are the most common means of virus distribution? (Select TWO)

Malicious websites Email

Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never had a membership before. When Joe looks closer, he discover that a hyperlink in the email points to a suspicious URL. Which of the following security threats does this describe?

Phishing

Which of the following is the process of fixing problems detected by anti-virus software so that the computer is restored to its original state?

Remediation

You have a computer that runs Windows 10. Where would you go to verify that the system has recognized the anti-malware software installed on the system?

Security and Maintenance

Which type of malicious activity can be described as numerous unwanted and unsolicited email messages sent to a wide range of victims?

Spamming

What is a program that appears to be a legitimate application, utility, game, or screensaver, but performs malicious activities surreptitiously?

Trojan

What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the system where it is found?

Virus

A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks. Which of the following dose this security threat describe?

Zombie/botnet


Ensembles d'études connexes

Schizophrenia, psychotic, Antipsychotic/Anxiolytic drugs

View Set

Statistics for Social Workers Chapter 2 Frequency Distribution/ Graphs

View Set

Nature of Science statements 11-20

View Set

CTS 110 Network Essentials Module 1 to Module 13 Quiz for Network+ Guide to Networks 8th Edition

View Set

Engine size and performance measurements

View Set