CompTIA A+ Core 2 Objective 2.3 – Security – Malware and Prevention

Posted by:

|

On:

|

,

Malware and Prevention

1 / 18

Why are generic greetings in emails considered a warning sign of phishing attempts?

2 / 18

A user’s computer has suddenly encrypted all their files, and they receive a message demanding payment in exchange for a decryption key. Which type of malware has infected the computer?

3 / 18

In which scenario is OS reinstallation considered the MOST appropriate step in the malware remediation process?

4 / 18

How do software firewalls contribute to preventing malware infections on individual computers?

5 / 18

An organization experiences an outbreak of malware that began spreading through email attachments, infecting systems upon opening the attachment. Which type of malware is primarily spread through this method?

6 / 18

Which aspect of user education is MOST critical for enhancing an organization’s defense against malware?

7 / 18

After downloading and running what appeared to be a legitimate software update, a user finds that malicious software was installed on their system. Which type of malware is typically spread in this manner?

8 / 18

Why is booting into recovery mode recommended when removing deeply embedded malware?

9 / 18

Which characteristic is MOST commonly found in a phishing email attempting to deceive recipients?

10 / 18

Which topic is MOST important to include in anti-phishing training to help employees identify phishing emails?

11 / 18

What feature of a link in an email should raise suspicion and suggest it might be part of a phishing attempt?

12 / 18

Which type of malware poses the greatest risk to the confidentiality of user credentials and sensitive information through unauthorized recording of keystrokes?

13 / 18

What is the MOST effective practice for preventing boot sector virus infections on a company’s workstations?

14 / 18

Which type of attachment in an email should be considered a red flag for a potential phishing attack?

15 / 18

An IT administrator is configuring a new workstation. Which practice is MOST effective in ensuring antivirus software provides optimal protection against malware?

16 / 18

A security analyst is reviewing logs and notices an application that is enabling unauthorized access to the system while hiding its presence. Which type of malware does this behavior best describe?

17 / 18

An organization’s network performance has significantly degraded, and analysis reveals high CPU and GPU usage across multiple systems without corresponding user activity. Which type of malware is MOST likely responsible?

18 / 18

Why is anti-phishing training considered a critical component of a comprehensive malware defense strategy?

Your score is

Exit