Exam 2: Computer Security Basics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

You believe your computer is infected by malware, but you have not kept your security software up-to-date. How can you quickly run an up-to-date scan for malware, providing you have an Internet connection?

Free
(Essay)
4.9/5
(33)
Correct Answer:
Verified

Connect to the site of a reputable source of malware protection and run an online scan of your computer. One example is HouseCall, available at www.trendmicro.com.

Briefly define the security tool known as a honey pot.

Free
(Essay)
4.8/5
(35)
Correct Answer:
Verified

A honey pot is a server created as a decoy to draw malware attacks and gather information about attackers. It may be located outside a corporate firewall, within a DMZ, or inside a corporate network.

FileVault, a feature of some editions of Windows, allows you to encrypt an entire drive.

Free
(True/False)
4.9/5
(35)
Correct Answer:
Verified

False

What should you do before donating an old computer to your favorite charity?

(Essay)
4.9/5
(34)

What term describes a group of networked computers infected with malware that forward information to other computers?

(Multiple Choice)
4.8/5
(33)

Your computer has been showing signs of a malware infection, and it started up in Safe Mode. Because your computer is not a member of an Active Directory domain, what powerful built-in account can you log on with to try to resolve the problem?

(Multiple Choice)
4.8/5
(32)

What type of malware is also a vector and gets its name from Virgil's famous epic poem, The Aeneid, which described how Greek warriors gained access to the City of Troy?

(Multiple Choice)
4.8/5
(33)

What type of malware replicates itself on a computer or throughout a network?

(Multiple Choice)
4.8/5
(37)

After typing in your password, you are greeted with an error message indicating that your user name or password is incorrect. What should you check before attempting to enter it again?

(Essay)
4.9/5
(35)

What term describes malware that takes advantage of a vulnerability in an operating system or application that is unknown to the publisher, leaving systems using that software vulnerable until the vulnerability is detected and patched?

(Multiple Choice)
4.9/5
(35)

What type of malware collects information about the user's browsing habits in order to display advertisements targeted to that user?

(Multiple Choice)
4.8/5
(31)

Use this type of program to guard against an especially annoying type of adware that appears in your browser and blocks the content you want to see.

(Multiple Choice)
4.8/5
(28)

Provide at least two common symptoms of a malware infection.

(Essay)
4.8/5
(41)

Briefly describe what you should do if you suspect that malware has infected your computer.

(Essay)
4.8/5
(41)

Once installed, this type of malware becomes a vector giving other malware administrative access to a computer.

(Multiple Choice)
4.8/5
(38)

Also called an application-layer gateway, this software will watch for application-specific traffic, acting as a stand-in for internal computers.

(Multiple Choice)
4.7/5
(25)

A Windows computer that is a member of a domain will have a local account named Administrator that you can access when your computer starts up in Safe Mode.

(True/False)
4.8/5
(41)

Windows will warn you if you try to log on with the Caps Lock key turned on.

(True/False)
4.8/5
(43)

What is the generic term for a mode or method of malware infection?

(Multiple Choice)
4.8/5
(31)

What is the oldest malware vector?

(Multiple Choice)
4.9/5
(32)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)