1. Which type of malware is a stand-alone program that replicates and sends itself to other computers?
Worm
Virus
Rootkit
Trojan
2. Which type of malware modifies or replaces parts of the operating system to hide the fact that the computer has been compromised?
Worm
Virus
Rootkit
Trojan
3. Which type of malware disguises itself as a useful program?
Worm
Virus
Rootkit
Trojan
4. Which term describes a unique set of instructions that identify malware code?
Fingerprint
Signature
Rule set
Heuristic
5. Which of the following terms means identifying malware based on past experience?
Heuristic analysis
Log file analysis
Signature analysis
Historical analysis
6. A signature database that is 1 month old may potentially expose that computer to how many new threats?
360,000
2,500,000
1,080,000
10,800,000
7. Which of the following terms describes a secure location to store identified malware?
Safe
Vault
Signature database
Secure storage
8. Which of the following anti-malware components is also referred to as a real-time scanner?
Shield
Scanner
Heuristic engine
Antivirus software
9. Which anti-malware tool is included with Windows 10?
Windows AntiVirus
Windows Doctor
Windows Defender
Windows Sweeper
10. Which of the following best describes a zero-day attack?
Malware that no longer is a threat
Malware that can exploit a vulnerability but has not yet been released
Malware that is actively exploiting vulnerabilities on computers that have not applied the latest patches
Malware that is actively exploiting an unknown vulnerability
11. What is the best first step to take when malware is discovered soon after installing new software?
Uninstall the new software.
Scan for malware.
Update the new software.
Install additional anti-malware software.
12. What is the best first step to take if initial actions to remove malware are not successful?
Install additional anti-malware software.
Rescan for malware.
Update the signature database.
Disconnect the computer from the network.
13. The Morris worm exploited this vulnerability: ________.
14. Which type of malware covertly primarily collects pieces of information?
Spyware
Trojan
Virus
Rootkit
15. Why is a rootkit so difficult to detect?
Most anti-malware tools don’t scan for rootkits.
A rootkit gives administrator privileges to an attacker.
A rootkit does not run in memory.
A rootkit may have modified the tools used to detect it.
18.119.158.134