
Module 5 Lesson 2.2
Presentation
•
Computers
•
7th - 12th Grade
•
Medium
Carissa Mulford
Used 2+ times
FREE Resource
19 Slides • 6 Questions
1
Module 5 Lesson 2.2
By Miranda Cauldwell
2
3
4
Backups
patches/updates
Antivirus software with updated signatures
Reducing
The route by which malware infects a computer is called a vector.
Risks
Preventing Malware
5
6
enabling someone to discover or learn something for themselves.
the software uses knowledge of the sort of things that viruses do to try to spot (and block) virus-like behavior.
Heuristic Identification
by virus patterns called
definitions or signatures
Detection
Anti-virus software
7
8
9
10
This anti-virus and anti-malware software combines with Windows Firewall to help protect your computer from threats
11
12
13
14
15
16
17
18
19
20
Multiple Select
Part of host hardening is to reduce the attack surface. What configuration changes does reducing the attack surface involve?
Removing unwanted and unnecessary software
disabling unused OS features and services
shutting off the computers
keeping all applications from default
21
Multiple Choice
A form of malware that needs the user to trigger replication.
worm
virus
22
Multiple Choice
The malware encrypts the user's documents folder and any attached removable disks then extorts the user for money to release the encryption key.
What type of malware is this?
ransomware
spyware
adware
trojan horse
23
Multiple Choice
Most anti-virus software can remediate a system by blocking access to an infected file but not actually deleting it.
True
False
24
Multiple Select
What is the main means by which anti-virus software identifies infected files?
defintions
signatures
heuristic behavior
the infected files are in purple
25
Multiple Select
What are the two main ways that spam might expose recipients to hazardous content?
malware infected attachments
malicious websites
going to secure sites
Module 5 Lesson 2.2
By Miranda Cauldwell
Show answer
Auto Play
Slide 1 / 25
SLIDE
Similar Resources on Wayground
18 questions
Volleyball
Presentation
•
7th - 10th Grade
22 questions
TINKERCAD P2
Presentation
•
6th - 12th Grade
22 questions
ติว o-net ม.3
Presentation
•
KG
19 questions
1. pengenalan informatika BY SUARDII
Presentation
•
9th Grade - University
16 questions
Les 10 principaux risques de sécurité applicative selon l'OWASP
Presentation
•
KG - University
16 questions
Untitled lesson
Presentation
•
KG - University
13 questions
Computer Fundamentals
Presentation
•
7th - 12th Grade
18 questions
Pensamento computacional
Presentation
•
6th - 10th Grade
Popular Resources on Wayground
20 questions
STAAR Review Quiz #3
Quiz
•
8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
6 questions
Marshmallow Farm Quiz
Quiz
•
2nd - 5th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
19 questions
Classifying Quadrilaterals
Quiz
•
3rd Grade
12 questions
What makes Nebraska's government unique?
Quiz
•
4th - 5th Grade
Discover more resources for Computers
20 questions
STAAR Review Quiz #3
Quiz
•
8th Grade
7 questions
Warm Up 04.01.2026
Quiz
•
9th Grade
20 questions
Revising & Editing practice
Quiz
•
7th Grade
10 questions
Box Plots
Quiz
•
6th - 7th Grade
8 questions
Amoeba Sister Asexual vs Sexual Reproduction
Interactive video
•
8th Grade
14 questions
Volume of rectangular prisms
Quiz
•
7th Grade
50 questions
STAAR English 2 Review
Quiz
•
10th Grade
15 questions
Pythagorean Theorem Word Problems Quizizz
Quiz
•
8th Grade