CompTIA ITF 21,22,23

CompTIA ITF 21,22,23

6th Grade

16 Qs

quiz-placeholder

Similar activities

Cybersecurity - Security Threats

Cybersecurity - Security Threats

6th Grade - University

20 Qs

Cyber Safety

Cyber Safety

4th - 7th Grade

17 Qs

Unit 3 Review - Careers & Security

Unit 3 Review - Careers & Security

6th Grade

20 Qs

Word Module 1 Vocabulary

Word Module 1 Vocabulary

6th - 12th Grade

18 Qs

about Callie

about Callie

6th Grade

13 Qs

Setting Tab Stops

Setting Tab Stops

6th - 12th Grade

15 Qs

Digital Citizenship

Digital Citizenship

5th - 12th Grade

15 Qs

ML FBLA Exploring Computer Applications - Security

ML FBLA Exploring Computer Applications - Security

6th - 8th Grade

20 Qs

CompTIA ITF 21,22,23

CompTIA ITF 21,22,23

Assessment

Quiz

Business

6th Grade

Medium

Created by

Diego Collado

Used 6+ times

FREE Resource

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the main difference between virus and worm malware?

A virus has to infect a file whereas a worm propagates in memory and over computer networks.

A virus propagates in memory and over computer networks whereas a worm has to infect a file.

A virus uses sequences of code that insert themselves into an executable whereas a worm uses document macros.

A virus uses a macro programming language to automate tasks where as a worm executes when the application is executed.

Answer explanation

The main difference between virus and worm malware is that a virus has to infect a file, whereas a worm propagates in memory and over computer networks.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

How might malware hosted on a website be able to infect your computer simply by you browsing the site?

By exploiting a human vulnerability related to deception

By exploiting outdated hardware installed in the computer chassis

By exploiting an improperly configured firewall

By exploiting a vulnerability in software installed on your computer

Answer explanation

The correct answer is by exploiting a vulnerability in software installed on your computer. Malware can take advantage of weaknesses in software to infect your system.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Malware encrypts the user's documents folder and any attached removable disks then extorts the user for money to release the encryption key. What type of malware is being described?

Spyware

Ransomware

Trojans

Worm

Answer explanation

The described malware encrypts user files and demands payment for the decryption key, indicating it is ransomware.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Your friend sent you an email link, which you have opened, and now the browser is asking whether you should install a plug-in to view all the content on the page. What should you do next?

Prevent the browser from installing the plug-in and change your passwords due to phishing.

Allow the browser to install the plug-in as it can be uninstalled later.

Run an antivirus scan because you have an active malware infection.

Check whether your friend actually sent the link in good faith first.

Answer explanation

Check whether your friend actually sent the link in good faith first.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the main means by which anti-virus software identifies infected files?

Using heuristics to detect suspicious behavior

Using definitions or signatures of known virus code

Using signatures of zero-day exploits

Using AutoRun to execute files of unknown provenance

Answer explanation

The main means by which anti-virus software identifies infected files is by using definitions or signatures of known virus code.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is a reputable source of management software and drivers for a particular system?

An OEM website

A third-party driver website

A peer-to-peer download application

A public forum website

Answer explanation

An OEM website is a reputable source for management software and drivers as they provide official and reliable updates specifically designed for the system.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which non-discretionary access control type is based on the idea of security clearance levels?

Role-based Access Control (RBAC)

Discretionary Access Control (DAC)

Mandatory Access Control (MAC)

Rule-based access control

Answer explanation

Mandatory Access Control (MAC) is based on security clearance levels, restricting access based on predefined security policies rather than user discretion.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?