Search Header Logo

Mentoring Security Chapter 4

Authored by Didik Suryabuana

Professional Development

1st - 5th Grade

Used 3+ times

Mentoring Security Chapter 4
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

1. An employee calls IT personnel and states that they received an email with a PDF document to review. After the PDF was opened, the system has not been performing correctly. An IT admin conducted a scan and found a virus. Determine the two classes of viruses the computer most likely has. (Select all that apply.)

Macro

Program

Script

Boot sector

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following depict ways a malicious attacker can gain access to a target's network? (Select all that apply.)

Shoulder surfing

Mantrap

Ethical hacking

Phishing

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

3. A tech concludes that a user's PC is infected with a virus that appears to be a memory resident and loads anytime the operating system is restarted. Examine the options and determine which describes the infection type

Monitors local application activity

Uses a local scripting engine

Written to the partition table of a fixed disk

Replicates over network resources

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

4. Which situation would require keyboard encryption software be installed on a computer?

To protect against spyware

To set up single sign-on privileges

To comply with input validation practices

For the purpose of key management

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A gaming company decides to add software on each title it releases. The company's objective is to require the CD to be inserted during use. This software will gain administrative rights, change system files, and hide from detection without the knowledge or consent of the user. Consider the malware characteristics and determine which is being used.

Rootkit

Trojan

Spyware

Keylogger

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?