A+ - 17C - Troubleshoot Workstation Security Issues

Passage
•
Computers
•
Professional Development
•
Hard
Brock McKinley
FREE Resource
19 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is malware?
Software that performs beneficial actions on a computer system.
Software that executes on a computer and performs harmful actions from the system owner's perspective.
Software that enhances network security by preventing unauthorized access.
Software that improves system performance by optimizing resource usage.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the vector of malware?
The classification of malware based on its payload.
The method by which malware executes on a computer and spreads to other network hosts.
The geographic location where malware originates.
The type of malware based on its behavior.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware conceals itself within the code of executable process images stored as files on disk?
Worms
Boot sector viruses
Trojans
Viruses
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do Trojans typically gain persistence on a system?
By replicating between processes in system memory.
By infecting the boot sector code on a disk drive.
By adding themselves to startup locations.
By using covert methods to take control of the host
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware replicates between processes in system memory rather than infecting executable files stored on disk?
Fileless malware
Trojans
Worms
Boot sector viruses
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary characteristic of fileless malware?
It infects the boot sector code on a disk drive.
It replicates between processes in system memory.
It conceals itself within executable process images stored as files on disk.
It uses the host’s scripting environment to create new malicious processes in
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware payload allows threat actors to access the PC, upload/exfiltrate data files, and install additional malware tools?
Spyware and Keyloggers
Backdoors
Rootkits
Ransomware and Cryptominers
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
Installing and Configuring Computer Systems 2

Quiz
•
Professional Development
20 questions
Cyber Security

Quiz
•
5th Grade - Professio...
21 questions
C-1 CHAPTER-3

Quiz
•
Professional Development
15 questions
Software Testing Methodologies and Standards

Quiz
•
Professional Development
15 questions
Basics in Active Directory for IT Helpdesk Quiz

Quiz
•
Professional Development
23 questions
ICEBERG_Assessment_Pre

Quiz
•
University - Professi...
20 questions
MTA: 98-367 Security Part 1

Quiz
•
KG - Professional Dev...
15 questions
DST09 - Day 2 Quiz

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade