Exam 2: Computer Security Basics
Exam 1: Introduction to Operating Systems50 Questions
Exam 2: Computer Security Basics50 Questions
Exam 3: Desktop Virtualization50 Questions
Exam 4: Windows 749 Questions
Exam 5: Windows 1050 Questions
Exam 6: Supporting and Troubleshooting Windows50 Questions
Exam 7: Apple Macos on the Desktop50 Questions
Exam 8: Linux on the Desktop50 Questions
Exam 9: Chromebooks and Chrome OS50 Questions
Exam 10: Connecting Desktops and Laptops to Networks50 Questions
Exam 11: Mobile Operating Systems: IOS and Android50 Questions
Select questions type
You believe your computer is infected by malware, but you have not kept your security software up-to-date. How can you quickly run an up-to-date scan for malware, providing you have an Internet connection?
Free
(Essay)
4.9/5
(33)
Correct Answer:
Connect to the site of a reputable source of malware protection and run an online scan of your computer. One example is HouseCall, available at www.trendmicro.com.
Briefly define the security tool known as a honey pot.
Free
(Essay)
4.8/5
(35)
Correct Answer:
A honey pot is a server created as a decoy to draw malware attacks and gather information about attackers. It may be located outside a corporate firewall, within a DMZ, or inside a corporate network.
FileVault, a feature of some editions of Windows, allows you to encrypt an entire drive.
Free
(True/False)
4.9/5
(35)
Correct Answer:
False
What should you do before donating an old computer to your favorite charity?
(Essay)
4.9/5
(34)
What term describes a group of networked computers infected with malware that forward information to other computers?
(Multiple Choice)
4.8/5
(33)
Your computer has been showing signs of a malware infection, and it started up in Safe Mode. Because your computer is not a member of an Active Directory domain, what powerful built-in account can you log on with to try to resolve the problem?
(Multiple Choice)
4.8/5
(32)
What type of malware is also a vector and gets its name from Virgil's famous epic poem, The Aeneid, which described how Greek warriors gained access to the City of Troy?
(Multiple Choice)
4.8/5
(33)
What type of malware replicates itself on a computer or throughout a network?
(Multiple Choice)
4.8/5
(37)
After typing in your password, you are greeted with an error message indicating that your user name or password is incorrect. What should you check before attempting to enter it again?
(Essay)
4.9/5
(35)
What term describes malware that takes advantage of a vulnerability in an operating system or application that is unknown to the publisher, leaving systems using that software vulnerable until the vulnerability is detected and patched?
(Multiple Choice)
4.9/5
(35)
What type of malware collects information about the user's browsing habits in order to display advertisements targeted to that user?
(Multiple Choice)
4.8/5
(31)
Use this type of program to guard against an especially annoying type of adware that appears in your browser and blocks the content you want to see.
(Multiple Choice)
4.8/5
(28)
Briefly describe what you should do if you suspect that malware has infected your computer.
(Essay)
4.8/5
(41)
Once installed, this type of malware becomes a vector giving other malware administrative access to a computer.
(Multiple Choice)
4.8/5
(38)
Also called an application-layer gateway, this software will watch for application-specific traffic, acting as a stand-in for internal computers.
(Multiple Choice)
4.7/5
(25)
A Windows computer that is a member of a domain will have a local account named Administrator that you can access when your computer starts up in Safe Mode.
(True/False)
4.8/5
(41)
Windows will warn you if you try to log on with the Caps Lock key turned on.
(True/False)
4.8/5
(43)
What is the generic term for a mode or method of malware infection?
(Multiple Choice)
4.8/5
(31)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)