Term
Which of the choices provided is used to identify malware traits and characteristics? |
|
Definition
|
|
Term
What are the other scan options in Windows Defender besides Quick Scan? |
|
Definition
|
|
Term
Windows Defender uses alert levels to define potentially unwanted software on your computer. What are the 4 alert levels? |
|
Definition
|
|
Term
True or False? Windows Defender does NOT report the date of its last system scan. |
|
Definition
|
|
Term
Which of the choices provided is used to identify malware traits and characteristics?
a. Penetration b. Concealment c. Impact d. Content |
|
Definition
|
|
Term
Your office requires badge keys for access. Holding the door for a third party who rushes up quickly behind you is a form of __________ engineering. |
|
Definition
|
|
Term
What are the genuine Windows Defender alert item actions? |
|
Definition
Default Action Ignore Remove |
|
|
Term
Many malware programs are loaded using email to gain access to the user's PC. Which of the filetype choices provided could be an infested screensaver?
a. XLXS b. MSI c. MSP d. SCR |
|
Definition
|
|
Term
Which type of malware rewrites its own code creating a logical equivalent each time it is run?
a. Metamorphic malware b. Polymorphic malware c. Oligomorphic malware d. Metastic malware |
|
Definition
|
|
Term
The purpose of this malware type is to spread and propagate itself.
a. Trojan b. Worm c. Spyware d. Adware |
|
Definition
|
|
Term
This phishing attack variation uses well-crafted and user-specific emails to produce the appearance of legitimacy.
a. Vishing b. Whaling c. Pharming d. Spear Phishing |
|
Definition
|
|
Term
Which of the choices provided correctly identifies spam targeted at instant message clients?
a. Spin b. Spim c. Simp d. Spamim |
|
Definition
|
|