Malware Protection Flashcards

1
Q

Which of the following could easily result in a mailbox being full so that messages can’t be received?

– Social engineering
– Impersonation
– Phishing
– Spam

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You have installed & our software that checks from viruses in email attachments. You configure the software to quarantine any files with problems. You receive an email with an important attachment, but the attachment is not there. Instead, you see a message that the file has been quarantined by the anti-malware software. What has happened to the file?

– It has been moved to a folder on your computer
– The file extension has been changed to prevent it from running
– The infection has been removed, and the file has been saved to the location
– It has been deleted from your system

A

It has been moved to a folder on your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a program that appears to be legitimate application, utility, game, or screensaver that performs malicious activities surreptitiously ?

– Outlook express
– Trojan horse
– Worm
– Active X control

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resource on the system where it is found?

– Virus
– Trojan horse
– Password attack
– Buffer overflow

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You discover that a system on your network has been infected with the worm. What is the best way to prevent the spread of the worm to other systems while you were removing the worm

– Close the firewall ports that the worm uses
– Run a system scan on other computers
– Quarantine the computer
– Update the virus definition files on computers

A

Quarantine the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If your antivirus software does not detect and remove the virus, what should you do first?

– Scan computer using another virus detection program
– Update your virus detection software
– Search for and delete the file you believe to be infected
– Set the read only attribute of the file you believe to be inspected

A

Update your virus detection software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A user reports that his machine will no longer boot properly. After asking several questions to determine the problem, you suspect of the user unknowingly downloaded malware from the Internet, and that the malware corrupted the block. Based on your suspicions, what actions could you take to correct the problem? (select two)

– Have the user attend an internal Internet safety training course
– Run sfc.exe
– Boot from the Windows 7 installation DVDs and use the recovery environment to run a startup repair
– Reimage the machine

A

– Boot from the Windows 7 installation DVDs and use the recovery environment to run a startup repair
– Reimage the machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the most common means of virus distribution? (Select two)

–Floppy disk
– Malicious websites
– Email
– Commercial software CDs
– Downloading music files from the Internet
A

– Malicious websites

– Email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following best describes spyware?

– It is a malicious program that is disguised as legitimate software
– It monitors the actions of the user that would denote their personal preferences, then send pop-ups and as to the user that matches their tastes
– It monitors the actions you take on your machine and send information back to us originating source
– It is a program that attempts to damage computer system and replicate itself two other computer systems

A

It monitors the actions you take on your machine and send information back to us originating source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of malicious activity can be described as numerous unwanted and unsolicited email messages sent to a wide range of victims?

– Spamming
– Hijacking
– Brute Force
– Trojan horse

A

Spamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You have a computer that runs Windows 7. Where would you go to check if the system can recognize and use any install antivirus software?

– Windows update
– Security center
– Windows firewall
– Networking sharing center

A

Security center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You’ve just received an email message that indicates a new serious malicious code threat is ravaging across the internet. The message contains detailed information about the threat, get source code, and the damage a conflict. The message states that you can easily detect whether or not you have all ready been the victim of this threat by the presence of the three files in the \Windows\System 32 folder. As a countermeasure, the message suggests that you delete these three files from your system to prevent further spread of the threat. What should you first action based on this messages be?

– Reboot the system
– Perform a complete system backup
– Delete the indicated files if Pres.
– Verify the information on well-known malicious code set management websites
– Distribute the message to everyone in your address book

A

Verify the information on well-known malicious code set management websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the key characteristic of a worm?

– It is a malicious program that is disguised as legitimate software
– It is malware that lies dormant until triggered
– It monitors the actions you take on the machine and send information back to its original source
– A worm can replicate itself and spread to other systems

A

A worm can replicate itself and spread to other systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

While running a full system scan using your antivirus program, three files have been identified as possible problems. you want to keep the files on top so you can examine them later. However, you want to make sure the files do not do any harm on your computer. Which action should you take?

– Repair the infected files
– Quarantine the files
– Delete the files
– Rename the files

A

Quarantine the files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is the process of fixing problems detected by antivirus software so that the computer is restored to its original state?

– Isolation
– Scanning
– Quarantine
– Remediation

A

Remediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You have just installed antivirus software on all computers on your company network. Which additional actions should you take to help protect systems from malicious software? (Select two)

– Train users to update the virus definition files frequently
– Configure all computers with a screen saver password
– Disconnect all computers from the Internet
– Train users to scan removable storage devices before copying files
– Require strong passwords in the local security policy
– Configure email servers to block all attachments

A

– Train users to update the virus definition files frequently
– Train users to scan removable storage devices before copying files

17
Q

After installing some software a few days ago, your DVD drive tray randomly begin to open and close. Today, you were called into your bosses office to discuss why you are calling 900 numbers while at work. What type of that work would create these symptoms?

– Spyware
– Greywhare
– Adware
– Trojan horse

A

Greywhare

18
Q

They use the reports that her machine behaving erratically. She suspects something is wrong on two programs are trying to access the Internet, and several files have disappeared or have been renamed. What do you suspect is causing these problems?

– Malware infection
– Incorrect drivers
– Low system memory
– Faulty network card

A

Malware infection