Security Flashcards
Malware is installed on a device after a user clicks on a link in a suspicious email.
Which of the following is the best way to remove the malware?
A. Run System Restore.
B. Place in recovery mode.
C. Schedule a scan.
D. Restart the PC.
C. Schedule a scan
Explanation:
Running a scan with antivirus or antimalware software is the best way to remove
malware from a device.
Breakdown of Each Choice:
* A. Run System Restore.
o Incorrect: Focuses on restoring system settings, not specifically for
malware removal.
* B. Place in recovery mode.
o Incorrect: Typically used for troubleshooting or OS reinstallation, not
specifically for malware removal.
* C. Schedule a scan.
o Correct: Most effective for detecting and removing malware.
* D. Restart the PC.
o Incorrect: Temporarily interrupts malware but doesn’t remo
When visiting a particular website, a user receives a message stating, “Your
connection is not private”. Which of the following describes this issue?
A. Certificate warning
B. Malware
C. JavaScript error
D. Missing OS update
a. Certificate warning
Explanation:
When a user receives a message stating “Your connection is not private,” it typically indicates a problem with the SSL/TLS certificate of the website. This warning alerts users that the website’s certificate is invalid, expired, or not issued by a trusted certificate authority, potentially compromising the security of the connection.
Breakdown of Each Choice:
* A. Certificate warning:
o Correct: Indicates an issue with the SSL/TLS certificate of the website,leading to an insecure connection.
* B. Malware:
o Incorrect: Malware typically refers to malicious software that can infect a system, but it’s not directly related to SSL/TLS certificate
issues.
* C. JavaScript error:
o Incorrect: JavaScript errors may affect the functionality of a website, but they don’t directly cause a “Your connection is not private” message.
* D. Missing OS update:
o Incorrect: Missing OS updates ccould potentially lead to security vulnerabilities, but they don’t directly cause a certificate warning message in the browser.
Which of the following is also known as something you know, something you have,
and something you are?
A. ACL
B. MFA
C. SMS
D. NFC
B. MFA
Explanation:
MFA involves “something you know” (like a password), “something you have” (like a
token or smartphone), and “something you are” (like biometric data). It enhances
security by requiring multiple forms of verification.
Breakdown of Each Choice:
* A. ACL (Access Control List):
o Incorrect: Defines permissions, not authentication factors.
* B. MFA (Multi-Factor Authentication):
o Correct: Requires multiple forms of verification for security.
* C. SMS (Short Message Service):
o Incorrect: Text messaging service, not authentication factors.
* D. NFC (Near Field Communication):
o Incorrect: Communication technology, not authentication factors.
Which of the following authentication types is the most secure?
A. WPA3
B. WEP
C. RADIUS
D. TACACS+
E. WPS
A. WPA3
Explanation:
WPA3 (Wi-Fi Protected Access 3) is the latest and most secure wireless
authentication protocol, offering enhanced security features compared to older
protocols.
Breakdown of Each Choice:
* A. WPA3:
o Correct: The most secure wireless authentication protocol with
advanced encryption and security features.
* B. WEP:
o Incorrect: An outdated and insecure wireless protocol easily broken
by modern attacks.
* C. RADIUS:
o Incorrect: While secure, RADIUS is an authentication server protocol,
not a direct comparison to WPA3 for wireless security.
* D. TACACS+:
o Incorrect: A secure network protocol for authentication, but not
directly comparable to WPA3 in terms of wireless security.
* E. WPS:
o Incorrect: A convenience feature for connecting devices to a wireless
network, known to have significant security vulnerabilities.
A user’s laptop has been performing slowly and redirecting to unfamiliar websites. The user has also noticed random pop-up windows. Which of the following is the first step a technician should take to resolve the issue?
A. Scan for malware and ransomware.
B. Perform a system restore.
C. Check the network utilization.
D. Update the antivirus software.
A. Scan for malware and ransomware.
Explanation:
The symptoms described—slow performance, website redirections, and random pop-ups—are indicative of a malware infection. The first step to resolve the issue is to scan the laptop for malware and ransomware to identify and remove any malicious software causing these problems.
Breakdown of Each Choice:
* A. Scan for malware and ransomware:
o Correct: Directly addresses the likely cause of the symptoms and is
the first step in identifying and removing malicious software.
* B. Perform a system restore:
o Incorrect: While this can help revert the system to a previous state, it
may not completely remove malware and should be considered after a
malware scan if necessary.
* C. Check the network utilization:
o Incorrect: This can help diagnose network-related issues but doesn’t
directly address the symptoms of malware.
* D. Update the antivirus software:
o Incorrect: While updating antivirus software is important, the
immediate step should be to perform a malware scan. Updating can
be done as part of the preparation for the scan.
A branch office suspects a machine contains ransomware. Which of the following mitigation steps should a technician take first?
A. Disable System Restore.
B. Remediate the system.
C. Educate the system user.
D. Quarantine the system
D. Quarantine the system
Explanation:
When ransomware is suspected on a machine, the first step is to isolate or
quarantine the system to prevent further spread of the infection to other machines
or network resources. This helps contain the ransomware and prevents additional
damage.
Breakdown of Each Choice:
* A. Disable System Restore:
o Incorrect: Disabling System Restore may prevent the recovery of
encrypted files but does not address the immediate need to contain
the ransomware.
* B. Remediate the system:
o Incorrect: While remediation is necessary, it should occur after the
system has been quarantined to prevent further spread of the
ransomware.
* C. Educate the system user:
o Incorrect: While user education is important for preventing future
incidents, it is not the immediate action needed when ransomware is
suspected.
* D. Quarantine the system:
o Correct: The first step is to isolate or quarantine the system to prevent
further spread of the ransomware.
Which of the following is an example of MFA?
A. Fingerprint scan and retina scan
B. Password and PIN
C. Username and password
D. Smart card and password
D. Smart card and password
Breakdown of Each Choice:
* A. Fingerprint scan and retina scan:
o Incorrect: Both are “something you are” (biometric factors) and do
not represent different types of authentication factors.
* B. Password and PIN:
o Incorrect: Both are “something you know” and do not represent
different types of authentication factors.
* C. Username and password:
o Incorrect: A username is not an authentication factor, and a password
alone is a single factor.
* D. Smart card and password:
o Correct: Combines “something you have” (smart card) and “something
you know” (password), representing true MFA
A technician is hardening a company file server and needs to prevent unauthorized
LAN devices from accessing stored files. Which of the following should the
technician use?
A. Software firewall
B. Password complexity
C. Antivirus application
D. Anti-malware scans
A. Software Firewall
Software Firewall: Implement a software firewall to control network traffic and
restrict access to authorized devices. Firewalls can block incoming and outgoing
connections based on predefined rules, enhancing security.
A user reports that an Android mobile device takes a long time to boot, and all
applications crash when launched. The user installed the applications from a thirdparty website. Which of the following steps should the technician complete to
diagnose the issue?
A. Scan the system for malware.
B. Clear the web browser cache.
C. Enroll the device in an MDM system.
D. Confirm the compatibility of the applications with the OS.
A. Scan the system for malware
Explanation:
Installing apps from third-party websites can introduce malware, causing slow boot
times and crashes. Scanning for malware addresses this issue.
Breakdown of Each Choice:
* A. Scan the system for malware:
o Correct: Targets malware, which is likely causing the problems.
* B. Clear the web browser cache:
o Incorrect: Does not address malware or performance issues.
* C. Enroll in an MDM system:
o Incorrect: Not relevant to immediate malware issues.
* D. Confirm app compatibility:
o Incorrect: Compatibility issues wouldn’t cause slow boot times or crash
all apps.
A technician is setting up a SOHO router in a user’s home. The user wants the
router to be configured to prevent access to malicious content and apply internet
access protection. Which of the following settings should the technician configure?
A. Port forwarding
B. Content filtering
C. Firmware updates
D. DHCP reservations
B. Content Filtering
Explanation:
Content filtering is a feature that allows a router to block access to certain websites
or types of content, such as malicious sites, providing a layer of internet access
protection.
Breakdown of Each Choice:
* A. Port forwarding:
o Incorrect: Used to direct incoming traffic to specific devices or
services within the network, not for blocking malicious content.
* B. Content filtering:
o Correct: Blocks access to specific websites or content types, helping to
prevent access to malicious content and provide internet protection.
* C. Firmware updates:
o Incorrect: Keeps the router software up to date but does not directly
filter content or block malicious sites.
* D. DHCP reservations:
o Incorrect: Assigns specific IP addresses to devices on the network, not
related to content filtering or internet protection.
A technician has verified a computer is infected with malware. The technician isolates the system and updates the anti-malware software. Which of the following should the technician do next?
A. Run one scan and schedule future scans.
B. Back up the uninfected files and reimage the computer.
C. Restore the clean backup copies of the infected files.
D. Run repeated remediation scans until the malware is removed.
D. Run repeated remediation scans until the malware is removed
Explanation:
After isolating and updating the anti-malware software on the infected system, it’s crucial to run multiple scans to ensure complete removal of the malware.
Breakdown of Each Choice:
* A. Run one scan and schedule future scans:
o Incorrect: One scan may not detect all malware, and relying solely on
future scans is insufficient for thorough removal.
* B. Back up uninfected files and reimage the computer:
o Incorrect: Reimaging is drastic and considered only if other remedies
fail, not the immediate next step.
* C. Restore clean backup copies of infected files:
o Incorrect: This doesn’t address the malware on the system; it’s for file
recovery.
* D. Run repeated remediation scans until malware is removed:
o Correct: Multiple scans ensure thorough removal of malware and
verify the effectiveness of the process
A user receives a call from someone claiming to be a technical support agent. The caller asks the user to log in to the computer. Which of the following security
measures should the user take to ensure security and privacy?
A. Only accept calls from known people.
B. Disregard any suspicious emails.
C. Update the antivirus software.
D. Enable two-factor authentication.
E. Install a malware scanner.
A. Only accept calls from known people.
The user received the call, only answer phone calls if we are expecting a call or
know the individual.
A user clicks a link in an email. A warning message in the user’s browser states the
site’s certificate cannot be verified. Which of the following is the most appropriate
action for a technician to take?
A. Click proceed.
B. Report the employee to the human resources department for violating company policy.
C. Restore the computer from the last known backup.
D. Close the browser window and report the email to IT security.
D. Close the browser window and report the email to IT security.
Explanation:
This action helps prevent potential security breaches and ensures that the
suspicious email is investigated properly. Closing the browser window avoids any
immediate risk, and reporting the email to IT security helps protect the organization
from potential threats.
Breakdown of Each Choice:
* A. Click proceed:
o Incorrect: Proceeding could expose the system to malware or other
security threats.
* B. Report the employee to the human resources department for
violating company policy:
o Incorrect: This may be premature without first addressing the
immediate security concern.
* C. Restore the computer from the last known backup:
o Incorrect: This is unnecessary unless the system is already
compromised, and it does not address the immediate need to report
the suspicious email.
* D. Close the browser window and report the email to IT security:
o Correct: This action prevents potential harm and ensures the incident
is properly investigated.
An employee has repeatedly contacted a technician about malware infecting a work
computer. The technician has removed the malware several times, but the user’s
PC keeps getting infected. Which of the following should the technician do to
reduce the risk of future infections?
A. Configure the firewall
B. Restore the system from backups.
C. Educate the end user.
D. Update the antivirus program.
c. Educate the end user
People are the weakest link.
A new spam gateway was recently deployed at a small business. However, users still occasionally receive spam. The management team is concerned that users will open the messages and potentially infect the network systems. Which of the
following is the most effective method for dealing with this issue?
A. Adjusting the spam gateway
B. Updating firmware for the spam appliance
C. Adjusting AV settings
D. Providing user training
D. Providing user training
Explanation:
User training is the most effective way to prevent users from opening spam and
infecting the network.
Breakdown of Each Choice:
* A. Adjusting the spam gateway: Improves filtering but won’t catch all spam.
* B. Updating firmware for the spam appliance: Ensures optimal
performance but doesn’t address user behavior.
* C. Adjusting AV settings: Helps detect malware but doesn’t prevent
interaction with spam.
* D. Providing user training: Educates users on handling spam, reducing
infection risk.