Malware

Malware

University

10 Qs

quiz-placeholder

Similar activities

SecureMind Quiz

SecureMind Quiz

University

13 Qs

Malware And Hackers

Malware And Hackers

KG - University

14 Qs

ias615: Group 1 : Computer Attack (Part 1)

ias615: Group 1 : Computer Attack (Part 1)

University

10 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Data Breach Quiz

Data Breach Quiz

University

12 Qs

تحدي المخترقين 2.0

تحدي المخترقين 2.0

University

15 Qs

IC3 GS6 Level 1 Domain 2 Lesson 1

IC3 GS6 Level 1 Domain 2 Lesson 1

6th Grade - University

15 Qs

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

9th Grade - University

10 Qs

Malware

Malware

Assessment

Quiz

Computers

University

Medium

Created by

Sean Kelly

Used 17+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Jackson has completed remediation of a virus-infected system. He eliminated all the startup program issues and uninstalled several browser add-ons. Jackson has scheduled scans to be performed daily and has run updates on Windows and the anti-malware program. He has enabled System Restore and created a new restore point.

What should Jackson do to complete the malware removal process?

Educate the end user.

Document the problem.

Recover the user data.

Reinstall Windows.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

While researching a network issue, Randy discovered a diagram that he can use to see the design of the network. 

What type of documentation did Randy discover?

Inventory management

Network topology

Knowledge base

Architectural drawing

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You have noticed that your computer is running slower than normal and that the amount of storage space on the hard drive is decreasing, even though you have not been doing anything different on your computer. You believe a program is replicating by attaching itself to other programs.

What type of malware is on your computer?

Trojan

Ransomware

Rootkit

Virus

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Kevin recently discovered that unknown processes are running in the background on his company’s web server. During a performance review, he also noticed that the CPU is working at 80% during downtimes. Kevin believes that software is running in the background and causing the CPU to run at such a high percentage. Kevin discovers that his server along with several other computers in the company have been used to perform a DDoS on another website.

What type of attack occurred?

Botnet

Spyware

Zero-day

DDoS

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The web server at Terry’s company recently was attacked by multiple computers. The attack overwhelmed the company’s web servers and caused the web servers to crash.

What type of attack occurred?

Botnet

Spyware

Zero-day

DDoS

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your company is using RADIUS for AAA services to connect wireless users to the Windows Active Directory domain. However, the company wants to upgrade to a Cisco-based wireless network and would like to upgrade the older RADIUS.

What will you recommend as an upgrade to RADIUS?

RADIUS+

TACACS+

AES

WPA2

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your company has decided to replace several hundred hard drives. It would like to donate the old hard drives to a local school system that will use them to increase storage on systems for students. However, the company also wants to make sure the hard drives are completely wiped before donating them.

Which disposal method will not allow the company to recycle the device?

Low level format

Degaussing

Overwrite

Drive wipe

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?