ITF+ Quiz Part 40

ITF+ Quiz Part 40

12th Grade

74 Qs

quiz-placeholder

Similar activities

ITE8 - Module 10 Terms

ITE8 - Module 10 Terms

12th Grade

71 Qs

EHE Module 4_5

EHE Module 4_5

12th Grade

77 Qs

Exploration of IT - Unit 4 Post Test

Exploration of IT - Unit 4 Post Test

9th - 12th Grade

71 Qs

Cybersecurity Unit 1 Review Part 2

Cybersecurity Unit 1 Review Part 2

12th Grade

74 Qs

Linux Final Quiz

Linux Final Quiz

12th Grade

75 Qs

AP CSP 12-17 - TUESDAY - Super Review

AP CSP 12-17 - TUESDAY - Super Review

9th - 12th Grade

71 Qs

DIT Unit 4 Study Guide

DIT Unit 4 Study Guide

6th Grade - University

76 Qs

ITF+ Quiz Part 40

ITF+ Quiz Part 40

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Pat Johnson

FREE Resource

74 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Part of host hardening is to reduce the attack surface. What configuration changes does reducing the attack surface involve?

Increasing the number of open ports

Disabling unnecessary services

Installing more software

Allowing all network traffic

Answer explanation

Reducing the attack surface involves disabling unnecessary services, not increasing open ports, installing more software, or allowing all network traffic.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between virus and worm malware?

Viruses can replicate themselves, worms cannot

Worms require user action to spread, viruses do not

Worms can replicate themselves and spread without user action, viruses require user action

Viruses are always harmful, worms are not

Answer explanation

Worms can replicate themselves and spread without user action, viruses require user action

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How might malware hosted on a website be able to infect your computer simply by your browsing the site?

By sending an email to your inbox

By exploiting vulnerabilities in your browser

By requiring you to download a file

By asking for your password

Answer explanation

By exploiting vulnerabilities in your browser

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How might spyware be able to steal a password?

By encrypting your files

By logging keystrokes

By sending spam emails

By displaying pop-up ads

Answer explanation

Spyware can steal a password by logging keystrokes, capturing the keys pressed by the user, including passwords entered.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware is being described? The malware encrypts the user's documents folder and any attached removable disks then extorts the user for money to release the encryption key.

Virus

Worm

Ransomware

Spyware

Answer explanation

The described malware encrypts user files and demands payment for decryption, indicating it is Ransomware.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Most anti-virus software can remediate a system by blocking access to an infected file but not actually deleting it. True or false?

True

False

Answer explanation

Most anti-virus software can remediate a system by blocking access to an infected file but not actually deleting it, making the statement true.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main means by which anti-virus software identifies infected files?

By checking file size

By scanning for known signatures

By monitoring network traffic

By analyzing user behavior

Answer explanation

By scanning for known signatures is the main means by which anti-virus software identifies infected files.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?