Malware Protection Flashcards
Which of the following could easily result in a mailbox being full so that messages can’t be received?
– Social engineering
– Impersonation
– Phishing
– Spam
Spam
You have installed & our software that checks from viruses in email attachments. You configure the software to quarantine any files with problems. You receive an email with an important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the anti-malware software. What has happened to the file?
– It has been moved to a folder on your computer
– The file extension has been changed to prevent it from running
– The infection has been removed, and the file has been saved to the location
– It has been deleted from your system
It has been moved to a folder on your computer
What is a program that appears to be legitimate application, utility, game, or screensaver that performs malicious activities surreptitiously ?
– Outlook express
– Trojan horse
– Worm
– Active X control
Trojan horse
What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resource on the system where it is found?
– Virus
– Trojan horse
– Password attack
– Buffer overflow
Virus
You discover that a system on your network has been infected with the worm. What is the best way to prevent the spread of the worm to other systems while you were removing the worm
– Close the firewall ports that the worm uses
– Run a system scan on other computers
– Quarantine the computer
– Update the virus definition files on computers
Quarantine the computer
If your antivirus software does not detect and remove the virus, what should you do first?
– Scan computer using another virus detection program
– Update your virus detection software
– Search for and delete the file you believe to be infected
– Set the read only attribute of the file you believe to be inspected
Update your virus detection software
A user reports that his machine will no longer boot properly. After asking several questions to determine the problem, you suspect of the user unknowingly downloaded malware from the Internet, and that the malware corrupted the block. Based on your suspicions, what actions could you take to correct the problem? (select two)
– Have the user attend an internal Internet safety training course
– Run sfc.exe
– Boot from the Windows 7 installation DVDs and use the recovery environment to run a startup repair
– Reimage the machine
– Boot from the Windows 7 installation DVDs and use the recovery environment to run a startup repair
– Reimage the machine
What are the most common means of virus distribution? (Select two)
–Floppy disk – Malicious websites – Email – Commercial software CDs – Downloading music files from the Internet
– Malicious websites
Which of the following best describes spyware?
– It is a malicious program that is disguised as legitimate software
– It monitors the actions of the user that would denote their personal preferences, then send pop-ups and as to the user that matches their tastes
– It monitors the actions you take on your machine and send information back to us originating source
– It is a program that attempts to damage computer system and replicate itself two other computer systems
It monitors the actions you take on your machine and send information back to us originating source
Which type of malicious activity can be described as numerous unwanted and unsolicited email messages sent to a wide range of victims?
– Spamming
– Hijacking
– Brute Force
– Trojan horse
Spamming
You have a computer that runs Windows 7. Where would you go to check if the system can recognize and use any install antivirus software?
– Windows update
– Security center
– Windows firewall
– Networking sharing center
Security center
You’ve just received an email message that indicates a new serious malicious code threat is ravaging across the internet. The message contains detailed information about the threat, get source code, and the damage a conflict. The message states that you can easily detect whether or not you have all ready been the victim of this threat by the presence of the three files in the \Windows\System 32 folder. As a countermeasure, the message suggests that you delete these three files from your system to prevent further spread of the threat. What should you first action based on this messages be?
– Reboot the system
– Perform a complete system backup
– Delete the indicated files if Pres.
– Verify the information on well-known malicious code set management websites
– Distribute the message to everyone in your address book
Verify the information on well-known malicious code set management websites
What is the key characteristic of a worm?
– It is a malicious program that is disguised as legitimate software
– It is malware that lies dormant until triggered
– It monitors the actions you take on the machine and send information back to its original source
– A worm can replicate itself and spread to other systems
A worm can replicate itself and spread to other systems
While running a full system scan using your antivirus program, three files have been identified as possible problems. you want to keep the files on top so you can examine them later. However, you want to make sure the files do not do any harm on your computer. Which action should you take?
– Repair the infected files
– Quarantine the files
– Delete the files
– Rename the files
Quarantine the files
Which of the following is the process of fixing problems detected by antivirus software so that the computer is restored to its original state?
– Isolation
– Scanning
– Quarantine
– Remediation
Remediation