CompTIA ITF 21,22,23

CompTIA ITF 21,22,23

6th Grade

16 Qs

quiz-placeholder

Similar activities

ML FBLA Financial Literacy - Identity Theft

ML FBLA Financial Literacy - Identity Theft

6th - 8th Grade

20 Qs

Business Studies Week 1

Business Studies Week 1

6th - 10th Grade

13 Qs

Word Processing Need to Know Terms

Word Processing Need to Know Terms

6th Grade

17 Qs

KB Posture & Technique Ret

KB Posture & Technique Ret

6th - 8th Grade

16 Qs

Higher Admin & IT - Communication

Higher Admin & IT - Communication

5th - 6th Grade

14 Qs

Banking Vocabulary

Banking Vocabulary

6th - 8th Grade

11 Qs

Excel Module 1 Cengage Vocabulary

Excel Module 1 Cengage Vocabulary

6th - 12th Grade

15 Qs

HELE 4 Chapter 2: Lessons 1 and 2

HELE 4 Chapter 2: Lessons 1 and 2

6th Grade

20 Qs

CompTIA ITF 21,22,23

CompTIA ITF 21,22,23

Assessment

Quiz

Business

6th Grade

Medium

Created by

Diego Collado

Used 6+ times

FREE Resource

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the main difference between virus and worm malware?

A virus has to infect a file whereas a worm propagates in memory and over computer networks.

A virus propagates in memory and over computer networks whereas a worm has to infect a file.

A virus uses sequences of code that insert themselves into an executable whereas a worm uses document macros.

A virus uses a macro programming language to automate tasks where as a worm executes when the application is executed.

Answer explanation

The main difference between virus and worm malware is that a virus has to infect a file, whereas a worm propagates in memory and over computer networks.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

How might malware hosted on a website be able to infect your computer simply by you browsing the site?

By exploiting a human vulnerability related to deception

By exploiting outdated hardware installed in the computer chassis

By exploiting an improperly configured firewall

By exploiting a vulnerability in software installed on your computer

Answer explanation

The correct answer is by exploiting a vulnerability in software installed on your computer. Malware can take advantage of weaknesses in software to infect your system.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Malware encrypts the user's documents folder and any attached removable disks then extorts the user for money to release the encryption key. What type of malware is being described?

Spyware

Ransomware

Trojans

Worm

Answer explanation

The described malware encrypts user files and demands payment for the decryption key, indicating it is ransomware.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Your friend sent you an email link, which you have opened, and now the browser is asking whether you should install a plug-in to view all the content on the page. What should you do next?

Prevent the browser from installing the plug-in and change your passwords due to phishing.

Allow the browser to install the plug-in as it can be uninstalled later.

Run an antivirus scan because you have an active malware infection.

Check whether your friend actually sent the link in good faith first.

Answer explanation

Check whether your friend actually sent the link in good faith first.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the main means by which anti-virus software identifies infected files?

Using heuristics to detect suspicious behavior

Using definitions or signatures of known virus code

Using signatures of zero-day exploits

Using AutoRun to execute files of unknown provenance

Answer explanation

The main means by which anti-virus software identifies infected files is by using definitions or signatures of known virus code.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is a reputable source of management software and drivers for a particular system?

An OEM website

A third-party driver website

A peer-to-peer download application

A public forum website

Answer explanation

An OEM website is a reputable source for management software and drivers as they provide official and reliable updates specifically designed for the system.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which non-discretionary access control type is based on the idea of security clearance levels?

Role-based Access Control (RBAC)

Discretionary Access Control (DAC)

Mandatory Access Control (MAC)

Rule-based access control

Answer explanation

Mandatory Access Control (MAC) is based on security clearance levels, restricting access based on predefined security policies rather than user discretion.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?