Emmen Kap 5

Which type of malware copies itself onto other computers without the owner’s consent and will often delete or corrupt files?
Virus
Worm
Trojan horse
Spyware
Which type of malware collects personal information or browsing history, often without the user’s knowledge?
Virus
Worm
Trojan horse
Spyware
Your computer seems to be slow, and you notice that you have a differentdefault web page than usual. What is most likely the cause of problems?
Your ISP has slowed your network connection.
Your computer has been infected with malware.
You did not update your computer.
You accidentally clicked the turbo button.
Besides installing an antivirus software package, you should always ___________ to protect your computer against malware.
Keep your machine up to date with the latest security patches
Reboot your computer on a regular basis
Change your password on a regular basis
Spoof your IP address
A thoroughly tested, cumulative set of hotfixes and other patches is knownas a(n):
Recommended update.
Hotfix pack.
Service pack.
Critical update.
What technology is used by Windows to prevent unauthorized changes toyour system?
UAC
Protected mode
Windows Defender
ProtectGuard
When using UAC, which of the following requires administrative permissions or rights?
Installing updates from Windows update
Changing the date and time
Resetting the network adapter
Installing drivers from Windows update or attached with the operatingsystem
What mechanism is working when you try to change a computer’s display settings and you get a pop-up asking whether you wish to continue?
Windows Firewall
Protected Mode
Windows Update
UAC
What host-based firewall software comes with current versions of Windows?
Windows Firewall
Windows Protected Mode
UAC
Windows GuardIt
What program would you use to configure IPsec on a computer runningWindows Server 2008?
Windows Firewall with IPsec Plugin
IPsec Monitor
Windows with Advanced Security
IPsec Configuration console
If you have sensitive or confidential information stored in your offline files,it is recommended that you:
Clear your cache.
Encrypt the offline files.
Clear your cookies.
Execute ipconfig /renewip.
You determine that legitimate emails are being blocked by your spam- blocking device. What should you do?
Flush out the quarantined items
Reboot the spam-blocking device
Add the address or domain for these emails to the white list
Add the address or domain for these emails to the black list
SMTP uses TCP port:
43
25
80
443
How many content zones are there in Internet Explorer?
1
2
4
8
Say that you receive an email stating that your account has just expired andasking you to log in to a legitimate-looking website to fix the problem. Thisis most likely an instance of:
Phishing.
Pharming.
Phaking.
IP address spoofing.
{"name":"Emmen Kap 5", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Which type of malware copies itself onto other computers without the owner’s consent and will often delete or corrupt files?, Which type of malware collects personal information or browsing history, often without the user’s knowledge?, Your computer seems to be slow, and you notice that you have a differentdefault web page than usual. What is most likely the cause of problems?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker