Search Header Logo
M5U2 - Using Best Practices (SY25-26/C103)

M5U2 - Using Best Practices (SY25-26/C103)

Assessment

Presentation

Computers

University

Medium

Created by

Don Bonus

Used 13+ times

FREE Resource

24 Slides • 10 Questions

1

media

2

media

3

Multiple Choice

Malicious software threats and tools designed to vandalize or compromise computer systems.

1

Virus

2

Malware

3

Spyware

4

Bloatware

4

media

5

media

6

Multiple Choice

A type of malware that tries to extort money from the victim.

1

Ransomware

2

Trojan Horse

3

Spyware

4

Worms

7

media

8

media

9

media

10

media

11

Multiple Choice

Which among the following is/are way/s of reducing exposure?

1

Apply patches and updates

2

Back-up data

3

Scan files on access

4

All of the mentioned

12

media

13

media

14

media

15

Multiple Choice

Spam that is delivered through instant messaging.

1

Worm

2

Spim

3

Phish

4

None of the mentioned

16

media

17

media

18

media

19

media

20

media

21

media

22

media

23

Multiple Choice

A collection of updates, fixes, or enhancements to a software program delivered as a single file.

1

Feature Updates

2

Patches

3

Anti-malware

4

All of the mentioned

24

media

25

media

26

media

27

media

28

media

29

media

30

Multiple Choice

A malware to be uploaded to a compromised website and to try to trigger exploits in the clients visiting the site via vulnerabilities in the OS, the web browser, or web browser plug-in.

1

Email Attachments

2

Autorun Media

3

Drive-by-download

4

All of the mentioned

31

Multiple Choice

A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail

1

Sniffing

2

Spoofing

3

Spamming

4

Phishing

32

Multiple Choice

True or False? An OEM site is a reputable source of management software and drivers for a particular system

1

TRUE

2

FALSE

33

Multiple Choice

Which among the following is not a risk factor for infection?

1

Unsolicited email

2

Unsafe website

3

Uncontrolled File Execution

4

None of the mentioned

34

Multiple Choice

A collection of security tasks used to reduce the scope of the device's vulnerability and attack surface.

1

Computer Updates

2

Device Hardening

3

Anti-virus Installation

4

All of the mentioned

media

Show answer

Auto Play

Slide 1 / 34

SLIDE