Exam 9: Defending Against Virus Attacks
Exam 1: Introduction to Network Security25 Questions
Exam 2: Types of Attacks27 Questions
Exam 3: Fundamentals of Firewalls27 Questions
Exam 4: Firewall Practical Applications19 Questions
Exam 5: Intrusion-Detection Systems26 Questions
Exam 6: Encryption25 Questions
Exam 7: Virtual Private Networks26 Questions
Exam 8: Operating System Hardening28 Questions
Exam 9: Defending Against Virus Attacks28 Questions
Exam 10: Defending Against Trojan Horses,spyware,and Adware26 Questions
Exam 11: Security Policies21 Questions
Exam 12: Assessing a System30 Questions
Exam 13: Security Standards21 Questions
Exam 14: Choosing Defense Strategies24 Questions
Select questions type
What is the most common method by which viruses spread?
Free
(Multiple Choice)
4.7/5
(30)
Correct Answer:
A
Perhaps due to its prevalence,____________ is the e-mail program most often hit by virus and worm attacks.
Free
(Short Answer)
4.8/5
(42)
Correct Answer:
Microsoft Outlook
Which is the most widespread danger to a computer connected to the Internet?
(Multiple Choice)
4.8/5
(38)
After cleaning a virus infection,what is the best way to assure that it does not recur?
(Multiple Choice)
4.9/5
(31)
Scanning by use of rules to determine whether a file or program is acting like a virus is called ____________ scanning.
(Short Answer)
4.9/5
(24)
Which is NOT an effective strategy to improve antivirus protection?
(Multiple Choice)
4.9/5
(37)
Self-replication and rapid spread define a computer ____________.
(Short Answer)
4.9/5
(29)
Which is the most effective and common method for defending a system against viruses and worms?
(Multiple Choice)
4.9/5
(29)
Which is a virus\worm spread in the form of a holiday greeting card?
(Multiple Choice)
4.9/5
(38)
A(n)____________ is a program that can spread without any human intervention.
(Short Answer)
4.8/5
(36)
A multilingual,Linux-compatible,antivirus software is available by free download for home and non-commercial uses and is named ____________.
(Short Answer)
4.8/5
(37)
To minimize security risks,systems should be configured to block or warn users before downloading any ____________ code such as ActiveX or Java applets.
(Short Answer)
4.8/5
(40)
In the event a virus is isolated on an infected machine,which would likely NOT be a necessary step to remove the threat?
(Multiple Choice)
4.8/5
(35)
Which antivirus software provides Private Data Protection and Home Network Control components for home users?
(Multiple Choice)
4.8/5
(38)
Some antivirus software actually scans ____________ on the server prior to downloading it to the local client.
(Short Answer)
4.8/5
(31)
Which is LEAST likely to be an effective method to isolate a suspected virus?
(Multiple Choice)
4.7/5
(33)
Showing 1 - 20 of 28
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)