A+ - 17C - Troubleshoot Workstation Security Issues

A+ - 17C - Troubleshoot Workstation Security Issues

Professional Development

19 Qs

quiz-placeholder

Similar activities

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

IS404 - SY2023

IS404 - SY2023

Professional Development

21 Qs

IT Quiz

IT Quiz

Professional Development

15 Qs

A+ - 11B - Use Performance and Troubleshooting Tools

A+ - 11B - Use Performance and Troubleshooting Tools

Professional Development

18 Qs

QUIZ

QUIZ

Professional Development

15 Qs

UJIAN SEMESTER II :  KKPI (TAHUN 2019-2020)

UJIAN SEMESTER II : KKPI (TAHUN 2019-2020)

Professional Development

20 Qs

ITF - Quiz 5.1 - Selecting a Computer

ITF - Quiz 5.1 - Selecting a Computer

Professional Development

15 Qs

sistem operasi

sistem operasi

11th Grade - Professional Development

21 Qs

A+ - 17C - Troubleshoot Workstation Security Issues

A+ - 17C - Troubleshoot Workstation Security Issues

Assessment

Passage

Computers

Professional Development

Hard

Created by

Brock McKinley

FREE Resource

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

Software that performs beneficial actions on a computer system.

Software that executes on a computer and performs harmful actions from the system owner's perspective.

Software that enhances network security by preventing unauthorized access.

Software that improves system performance by optimizing resource usage.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the vector of malware?

The classification of malware based on its payload.

The method by which malware executes on a computer and spreads to other network hosts.

The geographic location where malware originates.

The type of malware based on its behavior.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware conceals itself within the code of executable process images stored as files on disk?

Worms

Boot sector viruses

Trojans

Viruses

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do Trojans typically gain persistence on a system?

By replicating between processes in system memory.

By infecting the boot sector code on a disk drive.

By adding themselves to startup locations.

By using covert methods to take control of the host

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware replicates between processes in system memory rather than infecting executable files stored on disk?

Fileless malware

Trojans

Worms

Boot sector viruses

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary characteristic of fileless malware?

It infects the boot sector code on a disk drive.

It replicates between processes in system memory.

It conceals itself within executable process images stored as files on disk.

It uses the host’s scripting environment to create new malicious processes in

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware payload allows threat actors to access the PC, upload/exfiltrate data files, and install additional malware tools?

Spyware and Keyloggers

Backdoors

Rootkits

Ransomware and Cryptominers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?