Sec+ Review

Sec+ Review

Professional Development

22 Qs

quiz-placeholder

Similar activities

Google Classroom

Google Classroom

1st Grade - Professional Development

17 Qs

Infrastructure Architects and Network administrators Quiz

Infrastructure Architects and Network administrators Quiz

11th Grade - Professional Development

18 Qs

Công dân kỷ nguyên số- Máy tính cơ bản

Công dân kỷ nguyên số- Máy tính cơ bản

Professional Development

21 Qs

MS-900 2

MS-900 2

Professional Development

19 Qs

Cyber Awareness Contest (Individual Catagory)

Cyber Awareness Contest (Individual Catagory)

Professional Development

20 Qs

Cyber 2 Module 9

Cyber 2 Module 9

9th Grade - Professional Development

21 Qs

Cyber Security

Cyber Security

Professional Development

20 Qs

Module 4 AIML

Module 4 AIML

Professional Development

20 Qs

Sec+ Review

Sec+ Review

Assessment

Quiz

Computers

Professional Development

Hard

Created by

John Currie

Used 1+ times

FREE Resource

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A group of compromised computers that have software installed by a

worm or Trojan is known as which of the following?

Botnet

Rootkit

Virus

Zombie

Answer explanation

A botnet is a group of compromised computers, usually working

together, with malware that was installed by a worm or a Trojan horse. An

individual computer within a botnet is referred to as a zombie (among

other things). A virus is code that can infect a computer’s files. A rootkit

is a type of software designed to gain administrator-level access to a

system.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following computer security threats can be updated

automatically and remotely?

Virus

Worm

Zombie

Malware

Answer explanation

Zombies (also known as zombie computers) are systems that have

been compromised without the knowledge of the owner. A prerequisite is

the computer must be connected to the Internet so that the hacker or

malicious attack can make its way to the computer and be controlled

remotely. Multiple zombies working in concert often form a botnet.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have been given the task of scanning for viruses on a PC. What is the

best of the following methods?

Recovery environment

Command Prompt only

Dual-boot into Linux

Boot into Windows normally

Answer explanation

You should use a recovery environment. Most often, this would be the

one built into Windows. Many manufacturers suggest using this, and more

specifically Safe Mode. However, it could also be a Linux rescue disc or

flash drive. That’s not a true dual-boot though. An actual dual-boot is

when Windows and Linux are both installed to the hard drive. Command

Prompt only is not enough, nor is it necessary for some virus scanning

scenarios. Booting into Windows normally is tantamount to doing

nothing. Remember to use a recovery environment when scanning for

viruses.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common symptom of spyware?

Infected files

Applications freeze

Computer shuts down

Pop-up windows

Answer explanation

Pop-up windows are common to spyware. The rest of the answers are

more common symptoms of viruses.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Dan is a network administrator. One day he notices that his DHCP server

is flooded with information. He analyzes it and finds that the information

is coming from more than 50 computers on the network. Which of the

following is the most likely reason?

Virus

Zombie

Worm

PHP Script

Answer explanation

A worm is most likely the reason that the server is being bombarded

with information by the clients; perhaps it is perpetuated by a botnet.

Because worms self-replicate, the damage can quickly become critical.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not an example of malicious software?

Rootkits

Viruses

Spyware

Browser

Answer explanation

A web browser (for example, Internet Explorer) is the only one listed

that is not an example of malicious software. Although a browser can be

compromised in a variety of ways by malicious software, the application

itself is not the malware.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack uses more than one computer?

Virus

Worm

DoS

DDos

Answer explanation

A DDoS, or distributed denial-of-service, attack uses multiple

computers to make its attack, usually perpetuated on a server. None of the

other answers use multiple computers.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?