Search Header Logo

Cyber EOP - Anti-Virus/Malware & Removal By Mr. B

Authored by Cyber Professor - Mr. B

Computers

12th Grade

Used 2+ times

Cyber EOP - Anti-Virus/Malware & Removal By Mr. B
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

What does the term 'malware' refer to?

Data backup

Malicious software

Hardware damage

Network security

Answer explanation

The term 'malware' specifically refers to 'malicious software' designed to harm, exploit, or otherwise compromise computer systems. It does not relate to data backup, hardware damage, or network security.

2.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

Which type of malware encrypts files for extortion?

Trojans

Ransomware

Worms

Viruses

Answer explanation

Ransomware is a type of malware that encrypts files on a victim's system and demands payment for the decryption key, making it a tool for extortion. Other options like Trojans, worms, and viruses do not primarily focus on encryption for extortion.

3.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

What is a key characteristic of worms?

They only affect mobile devices

They are always visible to users

They can spread without user interaction

They require an infected application to spread

Answer explanation

Worms are unique in that they can spread independently, without requiring user interaction. This allows them to propagate rapidly across networks, unlike other malware that often needs a user to execute an infected file.

4.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

What is the first step in the malware removal process?

Quarantine the system

Download a malware scanner

Educate users

Run a system restore

Answer explanation

Quarantining the system is the first step in malware removal as it isolates the infected system to prevent further spread of malware, allowing for safe scanning and cleaning without risking other devices.

5.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

Which of the following is a best practice for protection against malware?

Using outdated software

Regularly updating systems

Ignoring suspicious emails

Disabling firewalls

Answer explanation

Regularly updating systems is crucial for protection against malware, as updates often include security patches that fix vulnerabilities. In contrast, using outdated software, ignoring suspicious emails, and disabling firewalls increase risk.

6.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

What is the purpose of a keylogger?

To encrypt files

To track keystrokes

To create backups

To spread malware

Answer explanation

A keylogger is designed to track keystrokes made by a user. This allows it to capture sensitive information like passwords and personal messages, making 'to track keystrokes' the correct purpose of a keylogger.

7.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

What should you do if you suspect a malware infection?

Continue using the system normally

Quarantine the system immediately

Ignore the symptoms

Download random software

Answer explanation

If you suspect a malware infection, you should quarantine the system immediately to prevent further damage and protect your data. Continuing to use the system or ignoring symptoms can lead to more severe issues.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?