CompTIA A+ Core 2 Objective 2.3 – Security – Malware and Prevention

Posted by:

|

On:

|

,

Malware and Prevention

1 / 18

Why is anti-phishing training considered a critical component of a comprehensive malware defense strategy?

2 / 18

What is the MOST effective practice for preventing boot sector virus infections on a company’s workstations?

3 / 18

A user’s computer has suddenly encrypted all their files, and they receive a message demanding payment in exchange for a decryption key. Which type of malware has infected the computer?

4 / 18

Which characteristic is MOST commonly found in a phishing email attempting to deceive recipients?

5 / 18

Why are generic greetings in emails considered a warning sign of phishing attempts?

6 / 18

Which type of attachment in an email should be considered a red flag for a potential phishing attack?

7 / 18

Why is booting into recovery mode recommended when removing deeply embedded malware?

8 / 18

An organization experiences an outbreak of malware that began spreading through email attachments, infecting systems upon opening the attachment. Which type of malware is primarily spread through this method?

9 / 18

After downloading and running what appeared to be a legitimate software update, a user finds that malicious software was installed on their system. Which type of malware is typically spread in this manner?

10 / 18

What feature of a link in an email should raise suspicion and suggest it might be part of a phishing attempt?

11 / 18

In which scenario is OS reinstallation considered the MOST appropriate step in the malware remediation process?

12 / 18

How do software firewalls contribute to preventing malware infections on individual computers?

13 / 18

An IT administrator is configuring a new workstation. Which practice is MOST effective in ensuring antivirus software provides optimal protection against malware?

14 / 18

Which aspect of user education is MOST critical for enhancing an organization’s defense against malware?

15 / 18

Which topic is MOST important to include in anti-phishing training to help employees identify phishing emails?

16 / 18

An organization’s network performance has significantly degraded, and analysis reveals high CPU and GPU usage across multiple systems without corresponding user activity. Which type of malware is MOST likely responsible?

17 / 18

Which type of malware poses the greatest risk to the confidentiality of user credentials and sensitive information through unauthorized recording of keystrokes?

18 / 18

A security analyst is reviewing logs and notices an application that is enabling unauthorized access to the system while hiding its presence. Which type of malware does this behavior best describe?

Your score is

Exit