CompTIA A+ Core 2 Objective 2.3 – Security – Malware and Prevention

Posted by:

|

On:

|

,

Malware and Prevention

1 / 18

A security analyst is reviewing logs and notices an application that is enabling unauthorized access to the system while hiding its presence. Which type of malware does this behavior best describe?

2 / 18

An organization experiences an outbreak of malware that began spreading through email attachments, infecting systems upon opening the attachment. Which type of malware is primarily spread through this method?

3 / 18

What feature of a link in an email should raise suspicion and suggest it might be part of a phishing attempt?

4 / 18

What is the MOST effective practice for preventing boot sector virus infections on a company’s workstations?

5 / 18

In which scenario is OS reinstallation considered the MOST appropriate step in the malware remediation process?

6 / 18

Why are generic greetings in emails considered a warning sign of phishing attempts?

7 / 18

Why is booting into recovery mode recommended when removing deeply embedded malware?

8 / 18

Which topic is MOST important to include in anti-phishing training to help employees identify phishing emails?

9 / 18

After downloading and running what appeared to be a legitimate software update, a user finds that malicious software was installed on their system. Which type of malware is typically spread in this manner?

10 / 18

An IT administrator is configuring a new workstation. Which practice is MOST effective in ensuring antivirus software provides optimal protection against malware?

11 / 18

Which type of attachment in an email should be considered a red flag for a potential phishing attack?

12 / 18

A user’s computer has suddenly encrypted all their files, and they receive a message demanding payment in exchange for a decryption key. Which type of malware has infected the computer?

13 / 18

Why is anti-phishing training considered a critical component of a comprehensive malware defense strategy?

14 / 18

An organization’s network performance has significantly degraded, and analysis reveals high CPU and GPU usage across multiple systems without corresponding user activity. Which type of malware is MOST likely responsible?

15 / 18

Which type of malware poses the greatest risk to the confidentiality of user credentials and sensitive information through unauthorized recording of keystrokes?

16 / 18

How do software firewalls contribute to preventing malware infections on individual computers?

17 / 18

Which aspect of user education is MOST critical for enhancing an organization’s defense against malware?

18 / 18

Which characteristic is MOST commonly found in a phishing email attempting to deceive recipients?

Your score is

Exit