CompTIA ITF 21,22,23

CompTIA ITF 21,22,23

6th Grade

16 Qs

quiz-placeholder

Similar activities

Estrategia de ventas S6

Estrategia de ventas S6

1st Grade - University

11 Qs

TLE 6

TLE 6

6th Grade

20 Qs

QUIZ 1 : TOPIC 8 [JOB ORDER COSTING]

QUIZ 1 : TOPIC 8 [JOB ORDER COSTING]

1st Grade - University

20 Qs

Money Money / Banks and Credit Unions

Money Money / Banks and Credit Unions

6th - 12th Grade

16 Qs

QUIZ 1 : TOPIC 4 [COST VOLUME PROFIT ANALYSIS]

QUIZ 1 : TOPIC 4 [COST VOLUME PROFIT ANALYSIS]

1st Grade - University

20 Qs

7°A Mercado, Mercadeo, Producto y cliente

7°A Mercado, Mercadeo, Producto y cliente

6th - 7th Grade

17 Qs

Word Module 2

Word Module 2

6th - 12th Grade

13 Qs

Global Business Key Terms

Global Business Key Terms

6th - 8th Grade

11 Qs

CompTIA ITF 21,22,23

CompTIA ITF 21,22,23

Assessment

Quiz

Business

6th Grade

Practice Problem

Medium

Created by

Diego Collado

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the main difference between virus and worm malware?

A virus has to infect a file whereas a worm propagates in memory and over computer networks.

A virus propagates in memory and over computer networks whereas a worm has to infect a file.

A virus uses sequences of code that insert themselves into an executable whereas a worm uses document macros.

A virus uses a macro programming language to automate tasks where as a worm executes when the application is executed.

Answer explanation

The main difference between virus and worm malware is that a virus has to infect a file, whereas a worm propagates in memory and over computer networks.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

How might malware hosted on a website be able to infect your computer simply by you browsing the site?

By exploiting a human vulnerability related to deception

By exploiting outdated hardware installed in the computer chassis

By exploiting an improperly configured firewall

By exploiting a vulnerability in software installed on your computer

Answer explanation

The correct answer is by exploiting a vulnerability in software installed on your computer. Malware can take advantage of weaknesses in software to infect your system.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Malware encrypts the user's documents folder and any attached removable disks then extorts the user for money to release the encryption key. What type of malware is being described?

Spyware

Ransomware

Trojans

Worm

Answer explanation

The described malware encrypts user files and demands payment for the decryption key, indicating it is ransomware.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Your friend sent you an email link, which you have opened, and now the browser is asking whether you should install a plug-in to view all the content on the page. What should you do next?

Prevent the browser from installing the plug-in and change your passwords due to phishing.

Allow the browser to install the plug-in as it can be uninstalled later.

Run an antivirus scan because you have an active malware infection.

Check whether your friend actually sent the link in good faith first.

Answer explanation

Check whether your friend actually sent the link in good faith first.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the main means by which anti-virus software identifies infected files?

Using heuristics to detect suspicious behavior

Using definitions or signatures of known virus code

Using signatures of zero-day exploits

Using AutoRun to execute files of unknown provenance

Answer explanation

The main means by which anti-virus software identifies infected files is by using definitions or signatures of known virus code.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is a reputable source of management software and drivers for a particular system?

An OEM website

A third-party driver website

A peer-to-peer download application

A public forum website

Answer explanation

An OEM website is a reputable source for management software and drivers as they provide official and reliable updates specifically designed for the system.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which non-discretionary access control type is based on the idea of security clearance levels?

Role-based Access Control (RBAC)

Discretionary Access Control (DAC)

Mandatory Access Control (MAC)

Rule-based access control

Answer explanation

Mandatory Access Control (MAC) is based on security clearance levels, restricting access based on predefined security policies rather than user discretion.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?