Wednesday , December 18 2024
Breaking News

Network Security Specialist – Virus Attacks and How to Defend Quiz Answers

  • On infected floppy disks
  • On infected CDs
  • Through instant messaging attachments
  • Through e-mail attachments
  • Scanning using a rules-based approach
  • Scanning based on a virus definition file
  • Scanning only system management areas (registry, boot sector, etc.)
  • Scheduled scanning
  • It overwrote the master boot record
  • It tried to overwrite parts of virus scanners
  • It tried to overwrite key system files
  • It sent out information about the infected computer
  • True
  • False
  • A file containing system information
  • A file that is infected
  • A file with corrupt data
  • A file with virus definitions
  • Scanning that is occurring all the time (i.e., actively)
  • Scanning for active web elements (scripts, ActiveX, and so on)
  • Actively scanning for malicious code
  • Actively scanning for worms
  • True
  • False
  • The type of scanning the software uses
  • How quickly the software updates in response to new viruses
  • How easy it is to configure and use
  • Cost of the software
  • Netbus
  • Shodan
  • Censys
  • FinFisher
  • True
  • False

About Clear My Certification

Check Also

AICTE Internships | Work based Learning with Stipend and Certification

AICTE Internships | Work based Learning with Stipend and Certification About the Program: The objective …

Leave a Reply

Your email address will not be published. Required fields are marked *