CompTIA Security+ Certification SY0-601: The Total Course - Chapter 10 Exam Question Review

CompTIA Security+ Certification SY0-601: The Total Course - Chapter 10 Exam Question Review

Assessment

Interactive Video

Information Technology (IT), Architecture, Other

University

Hard

Created by

Quizizz Content

FREE Resource

The video tutorial discusses various types of malware and the challenges in mitigating them. It presents a scenario where automatic malware scanner updates are configured for network hosts and explores which attacks are not mitigated by malware scanning, specifically ARP cache poisoning and hardware keyloggers. The tutorial explains how ARP cache poisoning works and why it is not detected by malware scanners. It also covers hardware keyloggers, highlighting their undetectability at the OS level, unlike software keyloggers and ransomware, which can be detected by malware scanners.

Read more

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key takeaway about malware scanning from the introduction?

Malware scanning can control all types of malware.

Not all malware incidents can be controlled by scanning.

Understanding malware types is unnecessary for mitigation.

Malware scanning is the only defense needed.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following attacks is not mitigated by malware scanning?

Software keylogger

Virus

ARP cache poisoning

Ransomware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does ARP cache poisoning work?

By encrypting user data files

By sending false ARP updates to redirect traffic

By installing a virus on the host

By logging keystrokes through software

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why can't hardware keyloggers be detected by malware scanners?

They are too small to detect.

They are encrypted.

They function at the hardware level.

They operate at the software level.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of threat can potentially be detected by malware scanners?

Physical theft

ARP cache poisoning

Software keylogger

Hardware keylogger