What is the primary vulnerability discussed in the video related to Microsoft Office files?
How to mitigate the Microsoft MSHTML remote code execution zero-day

Interactive Video
•
Architecture, Information Technology (IT)
•
University
•
Hard
Quizizz Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Phishing attacks via social media
Malicious use of Windows Explorer Preview Pane
Unauthorized access to email accounts
Data leakage through cloud services
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which file types are mentioned as being used in targeted attacks?
PDF and TXT
MP3 and WAV
Doc, Docx, Docm, and RTF
JPEG and PNG
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the first line of defense against opening malicious documents?
Installing a firewall
Educating users
Using a VPN
Regular software updates
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What additional protection does Will Dorman suggest using?
Using Microsoft Defender ASR rules
Disabling all macros
Installing third-party antivirus
Blocking all internet access
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of Microsoft Defender ASR rules?
To enhance system performance
To block office child processes
To allow remote desktop access
To enable faster internet browsing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What registry change can prevent ActiveX controls from running?
Disabling all network connections
Enabling automatic updates
Setting values for Internet zones
Changing desktop wallpaper
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is it important to assess your risk posture regarding zero-day attacks?
To enhance customer satisfaction
To reduce software costs
To determine the need for ASR rules
To improve employee productivity
Similar Resources on Quizizz
8 questions
Microsoft Defender for Business | What security admins need to know

Interactive video
•
University
2 questions
Microsoft Defender for Business | What security admins need to know

Interactive video
•
University
2 questions
How to protect a Windows network from ransomware

Interactive video
•
University
6 questions
Microsoft Attack Blamed on China Morphs Into Global Crisis

Interactive video
•
University
4 questions
How to mitigate the Microsoft MSHTML remote code execution zero-day

Interactive video
•
University
2 questions
How to use Attack Surface Reduction Rules in Windows 10

Interactive video
•
University
4 questions
How to use Attack Surface Reduction Rules in Windows 10

Interactive video
•
University
6 questions
How to prevent credential theft in Windows networks

Interactive video
•
University
Popular Resources on Quizizz
10 questions
Chains by Laurie Halse Anderson Chapters 1-3 Quiz

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
15 questions
Character Analysis

Quiz
•
4th Grade
12 questions
Multiplying Fractions

Quiz
•
6th Grade
30 questions
Biology Regents Review #1

Quiz
•
9th Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
50 questions
Biology Regents Review: Structure & Function

Quiz
•
9th - 12th Grade
Discover more resources for Architecture
10 questions
Identifying equations

Quiz
•
KG - University
16 questions
Chapter 8 - Getting Along with your Supervisor

Quiz
•
3rd Grade - Professio...
6 questions
Railroad Operations and Classifications Quiz

Quiz
•
University
71 questions
Logos

Quiz
•
3rd Grade - University
8 questions
Mali - Geography

Quiz
•
University