Search Header Logo

CYB125 - Ch8

Authored by Anonymous Anonymous

Information Technology (IT)

University

CYB125 - Ch8
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is not a typical sign of virus activity on a system?

Unexplained decrease in available disk space

Unexpected error messages

Unexpected power failures

Sudden sluggishness of applications

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of virus targets computer hardware and software startup functions?

Hardware infector

System infector

File infector

Data infector

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alison is a security professional. A user reports that, after opening an email attachment, every document he saves is in a template format and other Microsoft Word documents will not open. After investigating the issue, Alison determines that the user's Microsoft Office normal.dot template has been damaged, as well as many Word files. What type of virus is the most likely cause?

Polymorphic virus

Retro virus

Cross-platform virus

Macro virus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What file type is least likely to be impacted by a file infector virus?

.exe

.docx

.com

.dll

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Arturo discovers a virus on his system that resides only in the computer's memory and not in a file. What type of virus has he discovered?

Slow virus

Retro virus

Cross-platform virus

Multipartite virus

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following was one of the first ransomware programs that generally alerts users to restrictions and demands a payment to restore full access?

BitLocker

CryptoLocker

FileVault

CryptoVault

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lin installed a time-management utility that she downloaded from the Internet. Now several applications are not responding to normal commands. What type of malware did she likely encounter?

Virus

Worm

Ransomware

Trojan horse

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?