
How cyber attackers hide malware on your network
Interactive Video
•
Architecture, Information Technology (IT)
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common method used by malicious software to disguise itself on a Windows system?
As a system update
As a new user account
As an additional service
As a hidden folder
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is it important to baseline systems, especially servers?
To increase system speed
To identify abnormal activities
To reduce storage usage
To improve network connectivity
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a tool commonly used by attackers to hide their activities?
PowerShell
Vbscript
Jscript
Microsoft Word
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a characteristic of fileless malware?
It is easily detectable by antivirus software
It requires constant internet connection
It does not leave traces on the system
It uses large files to hide
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of attack surface reduction rules in Windows 10?
To simplify user interface
To reduce the risk of attacks
To enhance system performance
To increase storage capacity
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Before enabling attack surface reduction rules, what should be done first?
Increase system memory
Turn on auditing
Install new software
Disable all services
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does a value of '1' signify when configuring attack surface reduction rules?
Enable logging
Audit mode
Block or enable the rule
Disable the rule
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?