ITF+ Quiz Part 40

ITF+ Quiz Part 40

12th Grade

74 Qs

quiz-placeholder

Similar activities

Review Computer Question

Review Computer Question

9th - 12th Grade

75 Qs

IT Fundamentals CompTIA practice

IT Fundamentals CompTIA practice

10th - 12th Grade

75 Qs

CS Study Guide ALL

CS Study Guide ALL

12th Grade - University

74 Qs

Exchange Quiz

Exchange Quiz

KG - University

70 Qs

Latihan Test Pengetahuan AIJ Kelas XII

Latihan Test Pengetahuan AIJ Kelas XII

12th Grade

70 Qs

SRWE Final Exam Q's 61-120

SRWE Final Exam Q's 61-120

12th Grade

71 Qs

SIA 101 (Week 15)

SIA 101 (Week 15)

12th Grade - University

75 Qs

Understanding IT Fundamentals Quiz

Understanding IT Fundamentals Quiz

10th Grade - University

75 Qs

ITF+ Quiz Part 40

ITF+ Quiz Part 40

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Pat Johnson

FREE Resource

74 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Part of host hardening is to reduce the attack surface. What configuration changes does reducing the attack surface involve?

Increasing the number of open ports

Disabling unnecessary services

Installing more software

Allowing all network traffic

Answer explanation

Reducing the attack surface involves disabling unnecessary services, not increasing open ports, installing more software, or allowing all network traffic.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between virus and worm malware?

Viruses can replicate themselves, worms cannot

Worms require user action to spread, viruses do not

Worms can replicate themselves and spread without user action, viruses require user action

Viruses are always harmful, worms are not

Answer explanation

Worms can replicate themselves and spread without user action, viruses require user action

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How might malware hosted on a website be able to infect your computer simply by your browsing the site?

By sending an email to your inbox

By exploiting vulnerabilities in your browser

By requiring you to download a file

By asking for your password

Answer explanation

By exploiting vulnerabilities in your browser

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How might spyware be able to steal a password?

By encrypting your files

By logging keystrokes

By sending spam emails

By displaying pop-up ads

Answer explanation

Spyware can steal a password by logging keystrokes, capturing the keys pressed by the user, including passwords entered.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware is being described? The malware encrypts the user's documents folder and any attached removable disks then extorts the user for money to release the encryption key.

Virus

Worm

Ransomware

Spyware

Answer explanation

The described malware encrypts user files and demands payment for decryption, indicating it is Ransomware.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Most anti-virus software can remediate a system by blocking access to an infected file but not actually deleting it. True or false?

True

False

Answer explanation

Most anti-virus software can remediate a system by blocking access to an infected file but not actually deleting it, making the statement true.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main means by which anti-virus software identifies infected files?

By checking file size

By scanning for known signatures

By monitoring network traffic

By analyzing user behavior

Answer explanation

By scanning for known signatures is the main means by which anti-virus software identifies infected files.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers