TestOut 12.6 – Malware Protection – Practice Questions 12.6.8

Your page rank:

Total word count: 667
Pages: 2

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

If your anti-malware software does not detect and remove a virus, which of the following should you try first?

Update your malware definitions.

You have just installed antimalware software on all computers on your company’s network. Which additional actions should you take to help protect systems from malicious software? (Select two.)

Train users to scan removable storage devices before copying files. Configure the software to automatically update its definition files.

To tightly control the antimalware settings on your computer, you elect to update the signature file manually. Even though you vigilantly update the signature file, the machine becomes infected with a new type of malware.

Which of the following actions would best prevent this scenario from occurring again?

Configure the software to automatically download the definition file updates as soon as they become available.

While running a full system scan using your anti-malware software, three files have been identified as possible problems. You want to keep the files intact so you can review them later, but you also need to ensure they can’t harm anything else on your computer.

What action should you take?

Quarantine the files

You have a computer that runs win 10. Where would you go to verify the system has recognized the anti-malware software installed on the system?

Security and Maintenance

What is a program that appears to be legitimate application, utility, game, or screensaver and that performs malicious activities surreptitiously?

Trojan Horse

While browsing the Internet, you notice that your browser displays popups containing advertisements that are related to recent keyword searches you have performed.

What is this an example of?


You’ve just received an email message that indicates a new serious malicious code threat is ravaging across the Internet. The message contains detailed information about the threat, its source code, and the damage it can inflict. The message states that you can easily detect whether or not you have already been a victim of this threat by the presence of three files in the \Windows\System32 folder. As a countermeasure, the message suggests that you delete these three files from your system to prevent further spread of the threat.

What should your first action based on this message be?

Run a full anti-malware scan Verify the information on well-known malicious code threat management Web Sites

What are the most common means of virus distribution? (Select two.)

Malicious web sites E-mail

What is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?


A user reports that her machine is behaving erratically. She suspects something is wrong because lately a firewall alerts keeps indicating programs are trying to access the Internet, and several files have disappeared or have been renamed. What do you suspect is causing these problems?

Malware infection.

You discover that a system on your network has been infected with a worm. What is the best way to prevent the spread of the worm to other systems while you work on removing the worm?

Quarantine the computer.

You have installed anti-malware software on computers at your business. Within a few days, however, you notice that one computer has a virus. When you question the user, she says she did install some software a few days ago, but it was supposed to be a file compression utility. She admits she did not scan the file before running it.

What should you add to your security measures to help prevent this from happening again?

User awareness training.

A user reports that his machine will no longer boot properly. After asking several questions to determine the problem, you suspect the user unknowingly downloaded malware from the Internet, and that the malware has infected the system.

Based on your suspicions, what actions could you take to correct the problem?

Revert the system to a restore point created before the malware infection occured. Use anti-malware software scanner to scan for and remove the infection.

Share This

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more


A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message