Which that the adhering to actions adds brand-new features and also fixes bugs because that anti-malware software? a. Update the anti-malware engine b. Quarantining infected files and also systemsc. Remediating unhealthy computersd. Downloading and install signature papers automatically

You are watching: To tightly control the anti-malware

Which form of malicious task can be explained as numerous unwanted and unsolicited email messages sent to a wide range of victims? a. Hijackingb. Brute forcec. Spamming d. Trojan horse
To tightly regulate the anti-malware settings on her computer, you elect to update the signature document manually. Also though girlfriend vigilantly upgrade the signature file, the an equipment becomes infected through a new kind of malware. I beg your pardon of the adhering to actions would best prevent this script from emerging again? a. Configure the software application to automatically download the virus definition files as quickly as they come to be available. B. Carefully review open up firewall ports and close any kind of unneeded portsc. Develop a scheduled task to operation sfc.exe dailyd. Switch to a much more reliable anti-virus software
Configure the software to instantly download the virus an interpretation files as shortly as they come to be available.
Which that the following could easily result in a mailbox being full so that messages can"t it is in received? a. Impersonationb. Social engineeringc. Spam d. Phishing
What is the vital characteristic that a worm? a. A worm have the right to replicate itself and also spread to other systems b. The is a malicious regimen that is disguised as legit software.c. The monitors the action you take on your device and sends the info back to that originating source.d. The is malware the lies dormant till triggered.
You have a computer that runs home windows 7. Where would you go to examine if the system deserve to recognize and also use any installed anti-virus software?a. Network and also Sharing Centerb. Home windows Firewallc. Windows Updated. Protection Center
A user reports the his maker will no longer boot properly. After questioning several concerns to identify the problem, you suspect the user unknowingly downloaded malware indigenous the Internet, and also that the malware corrupted the boots block. Based upon your suspicions , what actions can you require to correct the problem? (select two) a. Have actually the user to to visit an interior Internet safety training courseb. Run sfc.exec. Boots from the home windows 7 surroundings DVD and also use the Recovery setting to run a startup repaird. Reimage the machine
Boot native the home windows 7 environment DVD and also use the Recovery environment to run a startup repairReimage the machine
You"ve just received an e-mail blog post that indicates a new serious malicious code danger is ravaging throughout the Internet. The message contains detailed information around the threat, its source code, and also the damage it can inflict. The blog post states that you can quickly detect even if it is or not you have currently been a victim the this danger by the existence of the three files in \Windows\System32 folder. As a countermeasure, the message suggests that girlfriend delete these three papers from your system to prevent more spread the the threat. What have to your an initial action based on this post be? a. Carry out a finish system backup.b. Verify the info on popular malicious code hazard management web sites c. Distribution the post to anyone in your resolve book.d. Reboot the system.e. Delete the indicated files if present
You uncover that a mechanism on her network has actually been infected with a worm. What is the best way to prevent the spread out of the worm to other systems when you work-related on remove the worm? a. Upgrade the virus definition files on all computersb. Quarantine the computer system c. Run a device scan on other computersd. Close the firewall ports that the worm uses
What is a cookie? a. A file saved on her HDD that tracks net site preferences and use b. A malicious program that disguises itself as a valuable programc. A malicious regimen that runs as soon as you read an email attachmentd. One executable document that operation in the background and also tracks net use
Which the the complying with is the process of fixing difficulties detected by anti-virus software program so that the computer system is restored to its initial state? a. Remediation b. Isolationc. Quarantined. Scanning
You have actually installed anti-malware software application on a computer system that only you use. You want to defend the computer system from papers that girlfriend download native the Internet. What should you do following time come make sure that over there aren"t any type of existing files on your system that room infected? a. Upgrade the anti-malware engine softwareb. Quarantine your computerc. Run a complete scan d. Download the latest meaning files
If her anti-virus software application does no detect and also remove a virus, what need to you shot first? a. Upgrade your virus detection software application b. Scan the computer using an additional virus detection program.c. Set the read-only attribute of the record you think to it is in infected.d. Search for and delete the file you think to it is in infected
Your anti-virus software has detected malware on her system. However, the anti-virus software application is can not to eliminate it, and also when you shot to delete the files, you can"t due to the fact that they room in use. What have to you shot first? a. Reclaim or reinstall the operating systemb. Operation Sfc.exec. Boot right into Safe setting and try removing the malware d. Update the anti-virus definition files
What are the many common way of virus distribution? (select two)a. Emailb. Commercial software application CDsc. Floppy disksd. Downloading music papers from the internete. Malicious internet sites
After installing some software program a few days ago, your DVD drive tray randomly started to open and close. Today, girlfriend were called into her boss"s office to talk about why you space calling 900 number while in ~ work. Which kind of malware would create these symptoms? a. Grayware b. Spywarec. Trojan horsed. Adware
While searching the Internet, you notification that the browser display pop-ups that space targeted towards recent keyboard searches you have performed. What is this an instance of?a. Trojan horseb. Wormc. Graywared. Adware
What is the typical name for a regimen that has actually no helpful purpose, but attempts to spread out itself to various other systems and often damages sources on the solution where the is found?a. Password attackb. Buffer overflowc. Trojan horsed. Virus




Problem solving with C++9th EditionWalter Savitch
283 explanations
Sets found in the exact same folder
window.brianowens.tv<"productClickLinkData"> = <"name":"Section 12.1 ideal Practices","id":"106425786","price":"","category":"premium content","variant":"study guide","position":"","brand":"Lexasaurus">; QLoad("brianowens.tv.productClickLinkData"); return;})}elsewindow.brianowens.tv<"productClickLinkData"> = <"name":"Section 12.1 best Practices","id":"106425786","price":"","category":"premium content","variant":"study guide","position":"","brand":"Lexasaurus">; QLoad("brianowens.tv.productClickLinkData"); return;;window.location.assign("https://brianowens.tv/106425786/section-121-best-practices-flash-cards/");" id="1-106425786">
Section 12.1 ideal Practices
4 terms
window.brianowens.tv<"productClickLinkData"> = <"name":"Section 12.2 physical Security","id":"106427234","price":"","category":"premium content","variant":"study guide","position":"","brand":"Lexasaurus">; QLoad("brianowens.tv.productClickLinkData"); return;})}elsewindow.brianowens.tv<"productClickLinkData"> = <"name":"Section 12.2 physical Security","id":"106427234","price":"","category":"premium content","variant":"study guide","position":"","brand":"Lexasaurus">; QLoad("brianowens.tv.productClickLinkData"); return;;window.location.assign("https://brianowens.tv/106427234/section-122-physical-security-flash-cards/");" id="1-106427234">
Section 12.2 physics Security
6 terms
window.brianowens.tv<"productClickLinkData"> = <"name":"Section 12.3 society Engineering","id":"106430787","price":"","category":"premium content","variant":"study guide","position":"","brand":"Lexasaurus">; QLoad("brianowens.tv.productClickLinkData"); return;})}elsewindow.brianowens.tv<"productClickLinkData"> = <"name":"Section 12.3 social Engineering","id":"106430787","price":"","category":"premium content","variant":"study guide","position":"","brand":"Lexasaurus">; QLoad("brianowens.tv.productClickLinkData"); return;;window.location.assign("https://brianowens.tv/106430787/section-123-social-engineering-flash-cards/");" id="1-106430787">
Section 12.3 social Engineering
7 terms

See more: Watch Saturday Night Live Highlight: Do You Know What I Hate ?: Night Watchmen

window.brianowens.tv<"productClickLinkData"> = <"name":"Section 12.6 Authentication","id":"107233397","price":"","category":"premium content","variant":"study guide","position":"","brand":"Lexasaurus">; QLoad("brianowens.tv.productClickLinkData"); return;})}elsewindow.brianowens.tv<"productClickLinkData"> = <"name":"Section 12.6 Authentication","id":"107233397","price":"","category":"premium content","variant":"study guide","position":"","brand":"Lexasaurus">; QLoad("brianowens.tv.productClickLinkData"); return;;window.location.assign("https://brianowens.tv/107233397/section-126-authentication-flash-cards/");" id="1-107233397">