Search Header Logo

A+ - 17C - Troubleshoot Workstation Security Issues

Authored by Brock McKinley

Computers

Professional Development

A+ - 17C - Troubleshoot Workstation Security Issues
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

Software that performs beneficial actions on a computer system.

Software that executes on a computer and performs harmful actions from the system owner's perspective.

Software that enhances network security by preventing unauthorized access.

Software that improves system performance by optimizing resource usage.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the vector of malware?

The classification of malware based on its payload.

The method by which malware executes on a computer and spreads to other network hosts.

The geographic location where malware originates.

The type of malware based on its behavior.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware conceals itself within the code of executable process images stored as files on disk?

Worms

Boot sector viruses

Trojans

Viruses

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do Trojans typically gain persistence on a system?

By replicating between processes in system memory.

By infecting the boot sector code on a disk drive.

By adding themselves to startup locations.

By using covert methods to take control of the host

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware replicates between processes in system memory rather than infecting executable files stored on disk?

Fileless malware

Trojans

Worms

Boot sector viruses

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary characteristic of fileless malware?

It infects the boot sector code on a disk drive.

It replicates between processes in system memory.

It conceals itself within executable process images stored as files on disk.

It uses the host’s scripting environment to create new malicious processes in

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware payload allows threat actors to access the PC, upload/exfiltrate data files, and install additional malware tools?

Spyware and Keyloggers

Backdoors

Rootkits

Ransomware and Cryptominers

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?