A+ - 17C - Troubleshoot Workstation Security Issues

Passage
•
Computers
•
Professional Development
•
Hard
Brock McKinley
FREE Resource
19 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is malware?
Software that performs beneficial actions on a computer system.
Software that executes on a computer and performs harmful actions from the system owner's perspective.
Software that enhances network security by preventing unauthorized access.
Software that improves system performance by optimizing resource usage.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the vector of malware?
The classification of malware based on its payload.
The method by which malware executes on a computer and spreads to other network hosts.
The geographic location where malware originates.
The type of malware based on its behavior.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware conceals itself within the code of executable process images stored as files on disk?
Worms
Boot sector viruses
Trojans
Viruses
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do Trojans typically gain persistence on a system?
By replicating between processes in system memory.
By infecting the boot sector code on a disk drive.
By adding themselves to startup locations.
By using covert methods to take control of the host
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware replicates between processes in system memory rather than infecting executable files stored on disk?
Fileless malware
Trojans
Worms
Boot sector viruses
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary characteristic of fileless malware?
It infects the boot sector code on a disk drive.
It replicates between processes in system memory.
It conceals itself within executable process images stored as files on disk.
It uses the host’s scripting environment to create new malicious processes in
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware payload allows threat actors to access the PC, upload/exfiltrate data files, and install additional malware tools?
Spyware and Keyloggers
Backdoors
Rootkits
Ransomware and Cryptominers
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
ITF+ Ch10, Security Best Practices

Quiz
•
Professional Development
15 questions
Sec+ CH.1 Review Test

Quiz
•
Professional Development
20 questions
CSTC- In-House Review (Activity 1)

Quiz
•
Professional Development
15 questions
DST09 - Day 2 Quiz

Quiz
•
Professional Development
15 questions
Operating Systems

Quiz
•
Professional Development
20 questions
Installing and Configuring Computer Systems 2

Quiz
•
Professional Development
18 questions
A+ - 11B - Use Performance and Troubleshooting Tools

Quiz
•
Professional Development
20 questions
MTA - Microsoft Operating Systems Review 1

Quiz
•
10th Grade - Professi...
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade