PC Pro 12.6.8

25 July 2022
4.7 (114 reviews)
14 test answers

Unlock all answers in this set

Unlock answers (10)
question
As the IT technician for your company, you have discovered that the anti-malware software being used is not detecting and removing a virus. Which of the following would MOST likely correct this issue?
answer
Updating your malware definitions.
question
You have just installed anti-malware software on all computers on your company's network. Which of the following additional actions would be BEST to take to help protect systems from malicious software? (Select TWO.)
answer
* Train users to scan removable storage devices before copying files. * Configure the software to automatically update its definition files.
question
To tightly control the anti-malware settings on your computer, you elect to update the signature file manually. Even though you vigilantly update the signature file, the machine becomes infected with a new type of malware. Which of the following actions would BEST prevent this scenario from occurring again?
answer
Configure the software to automatically download the definition file updates as soon as they become available.
question
While running a full system scan using your anti-virus program, three files have been identified as possible problems. You want to keep the files intact so you can examine them later, but you also need to ensure they can't harm anything else on your computer. Which of the following is your next BEST step?
answer
Quarantine the files.
question
You have a computer that runs Windows 10. Where would you go to verify the system has recognized the anti-malware software installed on the system?
answer
Security and maintenance.
question
What is a program that appears to be a legitimate application, utility, game, or screensaver, but performs malicious activities surreptitiously?
answer
Trojan horse
question
While browsing the internet, you notice that your browser displays pop-ups containing advertisements that are related to recent keyword searches you have performed. What is this an example of?
answer
Adware
question
You've just received an e-mail message that indicates a new serious malicious code threat is ravaging across the Internet. The message contains detailed information about the threat, its source code, and the damage it can inflict. The message states that you can easily detect whether or not you have already been a victim of this threat by the presence of the three files in WindowsSystem32 folder. As a countermeasure, the message suggests that you delete these three files from your system to prevent further spread of the threat. Based on the email message, which of the following are the next BEST actions to complete? (Select TWO.)
answer
* Run a full anti-malware scan. * Verify the information on well-known malicious code threat management websites.
question
What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?
answer
Virus
question
What are the most common means of virus distribution? (Select TWO.)
answer
* Email * Malicious websites
question
Maisy reports that her machine is behaving erratically. She suspects something is wrong because lately a firewall alert keeps indicating that some programs are trying to access the internet. In addition, several files have disappeared or have been renamed. Which of the following is the MOST likely cause of Maisy's computer problems?
answer
Malware infection
question
you have discovered that a system on your network has been infected with a worm. your top priority is to prevent the worm from spreading to other systems while you work on removing the worm. Which of the following is the BEST next step to take.
answer
Quarantine the computer.
question
You have installed anti-malware software on computers at your business. Within a few days, however, you notice that one computer has a virus. When you question the user, she shays she did install some software a few days ago, but it was supposed to be a file compression utility. She admits she did not scan the file before running it. Which of the following should you add to your security measure to help prevent this from happening again?
answer
User awareness training
question
A user reports that his machine will no longer boot properly. After asking several questions to determine the problem, you suspect the user unknowingly downloaded malware from the internet, and that the malware has infected the system. Based on your two suspicions, which of the following actions would you MOST likely take to correct the problem? (Select TWO.)
answer
* Revert the system to a restore point created before the malware infection occurred. * Use an anti-malware scanner to scan for and remove the infection.