What is the primary vulnerability discussed in the video related to Microsoft Office files?
How to mitigate the Microsoft MSHTML remote code execution zero-day

Interactive Video
•
Architecture, Information Technology (IT)
•
University
•
Hard
Quizizz Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Phishing attacks via social media
Malicious use of Windows Explorer Preview Pane
Unauthorized access to email accounts
Data leakage through cloud services
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which file types are mentioned as being used in targeted attacks?
PDF and TXT
MP3 and WAV
Doc, Docx, Docm, and RTF
JPEG and PNG
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the first line of defense against opening malicious documents?
Installing a firewall
Educating users
Using a VPN
Regular software updates
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What additional protection does Will Dorman suggest using?
Using Microsoft Defender ASR rules
Disabling all macros
Installing third-party antivirus
Blocking all internet access
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of Microsoft Defender ASR rules?
To enhance system performance
To block office child processes
To allow remote desktop access
To enable faster internet browsing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What registry change can prevent ActiveX controls from running?
Disabling all network connections
Enabling automatic updates
Setting values for Internet zones
Changing desktop wallpaper
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is it important to assess your risk posture regarding zero-day attacks?
To enhance customer satisfaction
To reduce software costs
To determine the need for ASR rules
To improve employee productivity
Similar Resources on Quizizz
8 questions
How to use Attack Surface Reduction Rules in Windows 10

Interactive video
•
University
8 questions
How attackers exploit the COVID crisis to compromise your network

Interactive video
•
University
6 questions
How to prevent credential theft in Windows networks

Interactive video
•
University
8 questions
How to protect a Windows network from ransomware

Interactive video
•
University
6 questions
How to defend Windows 10 from itself

Interactive video
•
University
6 questions
How to block malicious JavaScript files in Windows environments

Interactive video
•
University
6 questions
Reviewing software risks on your Windows network

Interactive video
•
University
2 questions
How to mitigate the Microsoft MSHTML remote code execution zero-day

Interactive video
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz

Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
15 questions
June Review Quiz

Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles

Quiz
•
8th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade