CompTIA A+ Core 2 Objective 2.3 – Security – Malware and Prevention

Posted by:

|

On:

|

,

Malware and Prevention

1 / 18

Which topic is MOST important to include in anti-phishing training to help employees identify phishing emails?

2 / 18

Which characteristic is MOST commonly found in a phishing email attempting to deceive recipients?

3 / 18

An organization’s network performance has significantly degraded, and analysis reveals high CPU and GPU usage across multiple systems without corresponding user activity. Which type of malware is MOST likely responsible?

4 / 18

Why is booting into recovery mode recommended when removing deeply embedded malware?

5 / 18

After downloading and running what appeared to be a legitimate software update, a user finds that malicious software was installed on their system. Which type of malware is typically spread in this manner?

6 / 18

Why is anti-phishing training considered a critical component of a comprehensive malware defense strategy?

7 / 18

A user’s computer has suddenly encrypted all their files, and they receive a message demanding payment in exchange for a decryption key. Which type of malware has infected the computer?

8 / 18

What is the MOST effective practice for preventing boot sector virus infections on a company’s workstations?

9 / 18

An organization experiences an outbreak of malware that began spreading through email attachments, infecting systems upon opening the attachment. Which type of malware is primarily spread through this method?

10 / 18

An IT administrator is configuring a new workstation. Which practice is MOST effective in ensuring antivirus software provides optimal protection against malware?

11 / 18

Which type of malware poses the greatest risk to the confidentiality of user credentials and sensitive information through unauthorized recording of keystrokes?

12 / 18

What feature of a link in an email should raise suspicion and suggest it might be part of a phishing attempt?

13 / 18

A security analyst is reviewing logs and notices an application that is enabling unauthorized access to the system while hiding its presence. Which type of malware does this behavior best describe?

14 / 18

Which type of attachment in an email should be considered a red flag for a potential phishing attack?

15 / 18

Which aspect of user education is MOST critical for enhancing an organization’s defense against malware?

16 / 18

How do software firewalls contribute to preventing malware infections on individual computers?

17 / 18

In which scenario is OS reinstallation considered the MOST appropriate step in the malware remediation process?

18 / 18

Why are generic greetings in emails considered a warning sign of phishing attempts?

Your score is

Exit