Search Header Logo

ITF+ Quiz Part 40

Authored by Pat Johnson

Computers

12th Grade

ITF+ Quiz Part 40
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

74 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Part of host hardening is to reduce the attack surface. What configuration changes does reducing the attack surface involve?

Increasing the number of open ports

Disabling unnecessary services

Installing more software

Allowing all network traffic

Answer explanation

Reducing the attack surface involves disabling unnecessary services, not increasing open ports, installing more software, or allowing all network traffic.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between virus and worm malware?

Viruses can replicate themselves, worms cannot

Worms require user action to spread, viruses do not

Worms can replicate themselves and spread without user action, viruses require user action

Viruses are always harmful, worms are not

Answer explanation

Worms can replicate themselves and spread without user action, viruses require user action

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How might malware hosted on a website be able to infect your computer simply by your browsing the site?

By sending an email to your inbox

By exploiting vulnerabilities in your browser

By requiring you to download a file

By asking for your password

Answer explanation

By exploiting vulnerabilities in your browser

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How might spyware be able to steal a password?

By encrypting your files

By logging keystrokes

By sending spam emails

By displaying pop-up ads

Answer explanation

Spyware can steal a password by logging keystrokes, capturing the keys pressed by the user, including passwords entered.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware is being described? The malware encrypts the user's documents folder and any attached removable disks then extorts the user for money to release the encryption key.

Virus

Worm

Ransomware

Spyware

Answer explanation

The described malware encrypts user files and demands payment for decryption, indicating it is Ransomware.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Most anti-virus software can remediate a system by blocking access to an infected file but not actually deleting it. True or false?

True

False

Answer explanation

Most anti-virus software can remediate a system by blocking access to an infected file but not actually deleting it, making the statement true.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main means by which anti-virus software identifies infected files?

By checking file size

By scanning for known signatures

By monitoring network traffic

By analyzing user behavior

Answer explanation

By scanning for known signatures is the main means by which anti-virus software identifies infected files.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?