Search Header Logo

CompTIA ITF 21,22,23

Authored by Diego Collado

Business

6th Grade

Used 6+ times

CompTIA ITF 21,22,23
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the main difference between virus and worm malware?

A virus has to infect a file whereas a worm propagates in memory and over computer networks.

A virus propagates in memory and over computer networks whereas a worm has to infect a file.

A virus uses sequences of code that insert themselves into an executable whereas a worm uses document macros.

A virus uses a macro programming language to automate tasks where as a worm executes when the application is executed.

Answer explanation

The main difference between virus and worm malware is that a virus has to infect a file, whereas a worm propagates in memory and over computer networks.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

How might malware hosted on a website be able to infect your computer simply by you browsing the site?

By exploiting a human vulnerability related to deception

By exploiting outdated hardware installed in the computer chassis

By exploiting an improperly configured firewall

By exploiting a vulnerability in software installed on your computer

Answer explanation

The correct answer is by exploiting a vulnerability in software installed on your computer. Malware can take advantage of weaknesses in software to infect your system.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Malware encrypts the user's documents folder and any attached removable disks then extorts the user for money to release the encryption key. What type of malware is being described?

Spyware

Ransomware

Trojans

Worm

Answer explanation

The described malware encrypts user files and demands payment for the decryption key, indicating it is ransomware.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Your friend sent you an email link, which you have opened, and now the browser is asking whether you should install a plug-in to view all the content on the page. What should you do next?

Prevent the browser from installing the plug-in and change your passwords due to phishing.

Allow the browser to install the plug-in as it can be uninstalled later.

Run an antivirus scan because you have an active malware infection.

Check whether your friend actually sent the link in good faith first.

Answer explanation

Check whether your friend actually sent the link in good faith first.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the main means by which anti-virus software identifies infected files?

Using heuristics to detect suspicious behavior

Using definitions or signatures of known virus code

Using signatures of zero-day exploits

Using AutoRun to execute files of unknown provenance

Answer explanation

The main means by which anti-virus software identifies infected files is by using definitions or signatures of known virus code.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is a reputable source of management software and drivers for a particular system?

An OEM website

A third-party driver website

A peer-to-peer download application

A public forum website

Answer explanation

An OEM website is a reputable source for management software and drivers as they provide official and reliable updates specifically designed for the system.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which non-discretionary access control type is based on the idea of security clearance levels?

Role-based Access Control (RBAC)

Discretionary Access Control (DAC)

Mandatory Access Control (MAC)

Rule-based access control

Answer explanation

Mandatory Access Control (MAC) is based on security clearance levels, restricting access based on predefined security policies rather than user discretion.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?