Vous êtes sur la page 1sur 9

Test 2

Started on Tuesday, December 15, 2015, 10:06 PM


State Finished
Completed on Tuesday, December 15, 2015, 10:13 PM
Time taken 6 mins 45 secs
Points 10/12
Grade 83 out of 100
Question 1
Correct
1 points out of 1
Flag question

Question text
_____________ is/are software installed to monitor the user, taking at least
partial control of his/her system without the user's knowledge or consent.
Select one:
a. Adware

b. Spyware

c. Viruses

d. Botnets

Feedback
The correct answer is: Spyware
Question 2
Correct
1 points out of 1
Flag question

Question text
Installation and frequent update of a strong anti-virus package, and the
avoidance of unknown removable media are reasonable and effective
methods of defending against most types of ____________.
Select one:
a. Shoulder surfing

b. Brute-force attacks

c. DoD attacks

d. Malware

Feedback
The correct answer is: Malware
Question 3
Correct
1 points out of 1
Flag question

Question text
One major difference between a virus and a worm is that a worm:
Select one:
a. Requires an action by the user to execute

b. Is capable of replicating itself


c. Is malicious software

d. Is usually hidden in another program

Feedback
The correct answer is: Is capable of replicating itself
Question 4
Correct
1 points out of 1
Flag question

Question text
Several people in your email contacts list have complained about receiving
emails from your account. You know you didn’t send them. This may be the
result of:
Select one:
a. A Trojan

b. A worm

c. A virus

d. Spyware

Feedback
The correct answer is: A virus
Question 5
Correct
1 points out of 1
Flag question

Question text
A worm can replicate itself through an entire network without attachment to a
file, but the spread of a _____________________ requires some action by
the user, such as opening an email or an attachment.
Select one:
a. Virus

b. Adware

c. Spyware

d. Pop-ups

Feedback
The correct answer is: Virus
Question 6
Correct
1 points out of 1
Flag question

Question text
Adware is a term for software installed on a computer to display _________.
Select one:
a. Videos

b. Documents
c. Advertisements

d. Email addresses

Feedback
The correct answer is: Advertisements
Question 7
Correct
1 points out of 1
Flag question

Question text
Which of the following is a method of recovering from spyware infection?
Select one:
a. Manually remove the spyware yourself

b. Go to your inbox, and delete all present and past emails from any unfamiliar

address
c. Completely shut down and disconnect your computer from its power source,

waiting at least 48 hours to reboot


d. Send your computer back to the manufacturer (in the original package) with

detailed and documented complaints


Feedback
The correct answer is: Manually remove the spyware yourself
Question 8
Correct
1 points out of 1
Flag question

Question text
An anti-virus software suite can attempt to clean an infected file automatically.
In some cases, the software is unable to remove infected files and
___________ removal may be required in the event of malware infection.
Select one:
a. Physical

b. Manual

c. Local

d. Cloud

Feedback
The correct answer is: Manual

Question 9
Correct
1 points out of 1
Flag question

Question text
Generally, the visible signs of adware infection are _________, pop-up ads,
and the browser homepage changed to another page.
Select one:
a. Computer failures

b. Repeated, unexpected shut-downs


c. Computer sluggishness

d. Computer crashes

Feedback
The correct answer is: Computer sluggishness
Question 10
Incorrect
0 points out of 1
Flag question

Question text
Several possible indications of malware infection are odd system behavior
(crashing, freezing, etc.), programs opening and closing on their own,
recurring corrupted file messages, and unusually low _____________.
Select one:
a. Bandwidth

b. Sound

c. Memory

d. None of the above

Feedback
The correct answer is: Memory
Question 11
Incorrect
0 points out of 1
Flag question

Question text
Recovering from an adware infection is most commonly done by:
Select one:
a. Running a full system anti-virus scan on your computer

b. Re-installing the entire operating system

c. Researching it on the Internet and finding out how un-install or remove it

d. Replacing the hard drive

Feedback
The correct answer is: Running a full system anti-virus scan on your computer
Question 12
Correct
1 points out of 1
Flag question

Question text
Sensitive information loss, and the user's browsing habits being watched are
two risks _________ introduces to computing.
Select one:
a. Tele-commuting

b. Patches
c. Spyware

d. The Internet

Feedback
The correct answer is: Spyware

Vous aimerez peut-être aussi