CompTIA A+ Core 2 Objective 2.3 – Security – Malware and Prevention

Posted by:

|

On:

|

,

Malware and Prevention

1 / 18

Which type of attachment in an email should be considered a red flag for a potential phishing attack?

2 / 18

Why are generic greetings in emails considered a warning sign of phishing attempts?

3 / 18

Why is booting into recovery mode recommended when removing deeply embedded malware?

4 / 18

An organization’s network performance has significantly degraded, and analysis reveals high CPU and GPU usage across multiple systems without corresponding user activity. Which type of malware is MOST likely responsible?

5 / 18

An IT administrator is configuring a new workstation. Which practice is MOST effective in ensuring antivirus software provides optimal protection against malware?

6 / 18

What feature of a link in an email should raise suspicion and suggest it might be part of a phishing attempt?

7 / 18

In which scenario is OS reinstallation considered the MOST appropriate step in the malware remediation process?

8 / 18

Why is anti-phishing training considered a critical component of a comprehensive malware defense strategy?

9 / 18

Which aspect of user education is MOST critical for enhancing an organization’s defense against malware?

10 / 18

Which type of malware poses the greatest risk to the confidentiality of user credentials and sensitive information through unauthorized recording of keystrokes?

11 / 18

Which characteristic is MOST commonly found in a phishing email attempting to deceive recipients?

12 / 18

An organization experiences an outbreak of malware that began spreading through email attachments, infecting systems upon opening the attachment. Which type of malware is primarily spread through this method?

13 / 18

After downloading and running what appeared to be a legitimate software update, a user finds that malicious software was installed on their system. Which type of malware is typically spread in this manner?

14 / 18

A security analyst is reviewing logs and notices an application that is enabling unauthorized access to the system while hiding its presence. Which type of malware does this behavior best describe?

15 / 18

Which topic is MOST important to include in anti-phishing training to help employees identify phishing emails?

16 / 18

A user’s computer has suddenly encrypted all their files, and they receive a message demanding payment in exchange for a decryption key. Which type of malware has infected the computer?

17 / 18

What is the MOST effective practice for preventing boot sector virus infections on a company’s workstations?

18 / 18

How do software firewalls contribute to preventing malware infections on individual computers?

Your score is

Exit