Search Header Logo
Untitled Presentation

Untitled Presentation

Assessment

Presentation

Information Technology (IT)

University

Practice Problem

Hard

Created by

Shashikant Patil

FREE Resource

13 Slides • 15 Questions

1

media

2

Open Ended

Why is understanding malware important for IT security and system management?

3

media

4

Multiple Choice

Which of the following is NOT a type of malware described in the lesson?

1

Virus

2

Trojan

3

Firewall

4

Ransomware

5

media

6

media

7

Open Ended

Explain the difference between static analysis and dynamic analysis in malware analysis. What are the risks associated with each method?

8

media

9

Open Ended

Malicious code is unwanted files or programs that can cause harm to a computer or compromise data stored on a computer. List two types of malicious code and briefly describe how they work.

10

media

11

Multiple Select

Which of the following are recommended practices to protect yourself against malicious code?

1

Install and maintain antivirus software

2

Use caution with links and attachments

3

Block pop-up advertisements

4

Disable your firewall

12

Fill in the Blank

To reduce the risk of infection from malicious code, it is important to ___ your software regularly.

13

media

14

Multiple Choice

What are the main steps you should take immediately after detecting that your computer or network might be infected with malware?

1

Connect to the internet and download more software

2

Remove the system from the network and scan with updated antivirus

3

Share files with other computers to check for infection

4

Ignore the issue and continue working

15

media

16

Multiple Choice

Which of the following is NOT a common symptom that your PC or network might be infected with malware?

1

An extremely slow and unresponsive PC

2

Random folders or shortcuts inside folders

3

Ability to delete any type of file without issue

4

Auto shutdown or reboot issues

17

media

18

Multiple Choice

Which type of malware is designed to mislead users into believing their device is infected, prompting them to install malware?

1

Adware

2

Rogueware

3

Spyware

4

Trojan horse

19

media

20

Multiple Select

Which of the following are recommended best practices to keep accounts safe?

1

Require strong passwords with at least eight characters

2

Enable multi-factor authentication

3

Never save passwords on a computer or network

4

Use public Wi-Fi without a VPN

21

Open Ended

Explain why it is important to use administrator accounts only when absolutely necessary. What risks are associated with improper use of administrator privileges?

22

media

23

Fill in the Blank

A hacker can infiltrate a business by exploiting application privileges. To reduce this risk, organizations should ___ application privileges on their devices.

24

media

25

Open Ended

Describe two different malware attack vectors and explain how they compromise their targets.

26

media

27

Fill in the Blank

A ___ virus is a type of malware that requires human intervention to run and propagate.

28

Open Ended

Reflecting on the different types of malware attacks discussed, which one do you think had the most significant impact on global cybersecurity, and why?

media

Show answer

Auto Play

Slide 1 / 28

SLIDE