Shared Flashcard Set

Details

Security+ Quiz 2
Chapter 2
12
Computer Networking
Undergraduate 2
01/28/2017

Additional Computer Networking Flashcards

 


 

Cards

Term
Which of the choices provided is used to identify malware traits and characteristics?
Definition
Concealment
Term
What are the other scan options in Windows Defender besides Quick Scan?
Definition
Full
Term
Windows Defender uses alert levels to define potentially unwanted software on your computer. What are the 4 alert levels?
Definition
Severe
High
Medium
Low
Term
True or False? Windows Defender does NOT report the date of its last system scan.
Definition
False
Term
Which of the choices provided is used to identify malware traits and characteristics?

a. Penetration
b. Concealment
c. Impact
d. Content
Definition
b. Concealment
Term
Your office requires badge keys for access. Holding the door for a third party who rushes up quickly behind you is a form of __________ engineering.
Definition
social
Term
What are the genuine Windows Defender alert item actions?
Definition
Default Action
Ignore
Remove
Term
Many malware programs are loaded using email to gain access to the user's PC. Which of the filetype choices provided could be an infested screensaver?

a. XLXS
b. MSI
c. MSP
d. SCR
Definition
d. SCR
Term
Which type of malware rewrites its own code creating a logical equivalent each time it is run?

a. Metamorphic malware
b. Polymorphic malware
c. Oligomorphic malware
d. Metastic malware
Definition
a. Metamorphic malware
Term
The purpose of this malware type is to spread and propagate itself.

a. Trojan
b. Worm
c. Spyware
d. Adware
Definition
b. Worm
Term
This phishing attack variation uses well-crafted and user-specific emails to produce the appearance of legitimacy.

a. Vishing
b. Whaling
c. Pharming
d. Spear Phishing
Definition
d. Spear Phishing
Term
Which of the choices provided correctly identifies spam targeted at instant message clients?

a. Spin
b. Spim
c. Simp
d. Spamim
Definition
b. Spim
Supporting users have an ad free experience!