14.7.9 Practice Questions
1. While browsing the internet, you notice that your browser displays pop-ups containing advertisements that are related to recent keyword searches that you have performed. Which of the following is this an example of?
Adware
2. Which of the following are the most common means of virus distribution? (Select two.)
Malicious websites
Email
3. Which of the following describes spyware?
It monitors the actions you take on your machine and sends the information back to the originating source.
4. Anna, a user, downloaded a free PDF editing application from the internet. Now her laptop constantly displays desktop pop-ups, and several applications don't start. Which of the following types of malware was Anna the victim of?
Trojan
5. Which of the following is a program that appears to be a legitimate application, utility, game, or screen saver, but performs malicious activities surreptitiously?
Trojan horse
6. You are troubleshooting a malware infection. As part of the remediation process, you have used a USB drive to boot into a lightweight version of Windows. Which of the following did you
MOST likely boot into?
WinPE
7. You have been tasked with removing malware from an infected system. You have confirmed that there is an infection, and you continue running scans and removing the malware, but every time the system is rebooted, the malware comes back. Which of the following should you do to help prevent this from happening?
Disable Windows System Restore
8. Which of the following should you do FIRST when you suspect a malware infection?
Investigate and verify the malware symptoms.
9. Which of the following should you do immediately after a malware infection is confirmed?
Quarantine the infected system.
10. After a malware infection has been fully remediated, you should re-enable System Restore and run a full system backup. Which of the following is the BEST place to save this backup?
On an external drive