
Cyber EOP - Anti-Virus/Malware & Removal By Mr. B
Authored by Cyber Professor - Mr. B
Computers
12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
18 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 3 pts
What does the term 'malware' refer to?
Data backup
Malicious software
Hardware damage
Network security
Answer explanation
The term 'malware' specifically refers to 'malicious software' designed to harm, exploit, or otherwise compromise computer systems. It does not relate to data backup, hardware damage, or network security.
2.
MULTIPLE CHOICE QUESTION
1 min • 3 pts
Which type of malware encrypts files for extortion?
Trojans
Ransomware
Worms
Viruses
Answer explanation
Ransomware is a type of malware that encrypts files on a victim's system and demands payment for the decryption key, making it a tool for extortion. Other options like Trojans, worms, and viruses do not primarily focus on encryption for extortion.
3.
MULTIPLE CHOICE QUESTION
1 min • 3 pts
What is a key characteristic of worms?
They only affect mobile devices
They are always visible to users
They can spread without user interaction
They require an infected application to spread
Answer explanation
Worms are unique in that they can spread independently, without requiring user interaction. This allows them to propagate rapidly across networks, unlike other malware that often needs a user to execute an infected file.
4.
MULTIPLE CHOICE QUESTION
1 min • 3 pts
What is the first step in the malware removal process?
Quarantine the system
Download a malware scanner
Educate users
Run a system restore
Answer explanation
Quarantining the system is the first step in malware removal as it isolates the infected system to prevent further spread of malware, allowing for safe scanning and cleaning without risking other devices.
5.
MULTIPLE CHOICE QUESTION
1 min • 3 pts
Which of the following is a best practice for protection against malware?
Using outdated software
Regularly updating systems
Ignoring suspicious emails
Disabling firewalls
Answer explanation
Regularly updating systems is crucial for protection against malware, as updates often include security patches that fix vulnerabilities. In contrast, using outdated software, ignoring suspicious emails, and disabling firewalls increase risk.
6.
MULTIPLE CHOICE QUESTION
1 min • 3 pts
What is the purpose of a keylogger?
To encrypt files
To track keystrokes
To create backups
To spread malware
Answer explanation
A keylogger is designed to track keystrokes made by a user. This allows it to capture sensitive information like passwords and personal messages, making 'to track keystrokes' the correct purpose of a keylogger.
7.
MULTIPLE CHOICE QUESTION
1 min • 3 pts
What should you do if you suspect a malware infection?
Continue using the system normally
Quarantine the system immediately
Ignore the symptoms
Download random software
Answer explanation
If you suspect a malware infection, you should quarantine the system immediately to prevent further damage and protect your data. Continuing to use the system or ignoring symptoms can lead to more severe issues.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?