13.6.10 Testout CTI 130

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is a cookie? A malicious program that runs when you read an email attachment. A malicious program that disguises itself as a useful program. An executable file that runs in the background and tracks internet use. A file saved on your hard drive that tracks website preferences and use.

A file saved on your hard drive that tracks website preferences and use.

While browsing the internet, you notice that your browser displays pop-ups containing advertisements that are related to recent keyword searches yo have performed. What is this an example of? Adware Grayware Worm Trojan

Adware

A user reports that his machine will no longer boot properly. After asking several questions to determine the problem, you suspect the user unknowingly downloaded malware from the internet, and that the malware corrupted the boot block. Based on your suspicions, which of the following actions would you MOST likely take to correct the problem? (Select TWO) Have the user attend an internal internet safety training course. Reimage the machine. Boot from the Windows installation DVD and use the Recovery Environment to run a startup repair. Boot into Safe Mode and try removing the malware. Run sfc.exe.

Boot from the Windows installation DVD and use the Recovery Environment to run a startup repair. Reimage the machine.

Your anti-malware software has detected a virus on your Windows 10 system. However, the anti-malware software is unable to remove it. When you try to delete the files, you can't because they are in use. Which of the following actions would be BEST to try first? Reset the operating system. Update the anti-malware definition files. Run Sfc.exe. Boot into Safe Mode and try removing the malware.

Boot into Safe Mode and try removing the malware.

You have recently had an issue where a user's Windows computer was infected with a virus. After removing the virus from the computer, which of the following is the NEXT step you should take? Install all OS updates. Enable System Restore. Educate the user. Create a restore point.

Install all OS updates

You have installed anti-malware software that checks for viruses in e-mail attachments. You configure the software to quarantine any files with problems. You receive an email with an important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the anti-malware software/ Which of the following BEST describes what happened to the file? It has been deleted from your system. The infection has been removed, and the file has been saved to a different location. The file extension has been changed to prevent it from running. It has been moved to a folder on your computer.

It has been moved to a folder on your computer.

Which of the following best describes spyware? It monitors the actions you take on your machine and sends the information back to its originating source. It is a program that attempts to damage a computer system and replicate itself to other computer systems. It monitors the actions of the user and then sends pop-up ads to the user that match their tastes. It is a malicious program that is disguised as legitimate software.

It monitors the actions you take on your machine and sends the information back to its originating source.

What are the most common means of virus distribution? (Select TWO) Commercial software CDs Email Floppy disks Malicious websites Downloading music files from the internet

Malicious websites Email

Joe, a user, receives an email from a popular video streaming website. The email urges him to renew his membership. The message appears official, but Joe has never had a membership before. When Joe looks closer, he discover that a hyperlink in the email points to a suspicious URL. Which of the following security threats does this describe? Trojan Phishing Man-in-the-middle Zero-day attack

Phishing

Which of the following is the process of fixing problems detected by anti-virus software so that the computer is restored to its original state? Isolation Remediation Quarantine Scanning

Remediation

You have a computer that runs Windows 10. Where would you go to verify that the system has recognized the anti-malware software installed on the system? System Security and Maintenance Windows Firewall Network and Sharing Center

Security and Maintenance

Which type of malicious activity can be described as numerous unwanted and unsolicited email messages sent to a wide range of victims? Spamming Crimeware Trojan Email hijacking

Spamming

What is a program that appears to be a legitimate application, utility, game, or screensaver, but performs malicious activities surreptitiously? Worm Trojan Ransomware Scareware

Trojan

What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the system where it is found? Password attack Virus Trojan Buffer overflow

Virus

A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks. Which of the following dose this security threat describe? Phishing Man-in-the-middle Spoofing Zombie/botnet

Zombie/botnet


Set pelajaran terkait

Pscyh-Ch. 13: Industrial-Organizational Psychology

View Set

RBI's Function, Monetary Policy & Fiscal Policy

View Set

Chapter 18, 19, 20 -Test Questions

View Set