How cyber attackers hide malware on your network

How cyber attackers hide malware on your network

Assessment

Interactive Video

Architecture, Information Technology (IT)

University

Hard

Created by

Quizizz Content

FREE Resource

The video tutorial discusses how malicious software hides in systems, often by mimicking legitimate services. It explains how attackers use tools like PowerShell and macros to infiltrate systems and evade detection. The tutorial highlights the importance of baselining systems to identify anomalies and introduces attack surface reduction rules in Windows 10 to enhance security. It emphasizes the need for auditing to ensure business processes are not disrupted by security measures.

Read more

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common method used by malicious software to disguise itself on a Windows system?

As a system update

As a new user account

As an additional service

As a hidden folder

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to baseline systems, especially servers?

To increase system speed

To identify abnormal activities

To reduce storage usage

To improve network connectivity

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a tool commonly used by attackers to hide their activities?

PowerShell

Vbscript

Jscript

Microsoft Word

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a characteristic of fileless malware?

It is easily detectable by antivirus software

It requires constant internet connection

It does not leave traces on the system

It uses large files to hide

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of attack surface reduction rules in Windows 10?

To simplify user interface

To reduce the risk of attacks

To enhance system performance

To increase storage capacity

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Before enabling attack surface reduction rules, what should be done first?

Increase system memory

Turn on auditing

Install new software

Disable all services

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a value of '1' signify when configuring attack surface reduction rules?

Enable logging

Audit mode

Block or enable the rule

Disable the rule