Training Study Guide 100% Accurate!!
Which type of malware prevents you from accessing files stored on your computer? -
ANSWERSRansomware
Which of the following is needed for a computer system or device to be vulnerable to
malware? - ANSWERSAn Internet connection
Joe is browsing the web and notices the light by his webcam is on. The website he is on
did not ask permission to access his webcam and he knows he did not turn it on. What
should Joe do? - ANSWERSReport the possible malware attack.
Which of the following provides the most protection against malware? -
ANSWERSUpdates
What method would a cyber attacker use to infect a system with malware? -
ANSWERSTricking a person into opening an infected file attached to a message.
Phishing is what type of attack? - ANSWERSSocial engineering
Which of the following is the best way to create a strong password? - ANSWERSUse a
long and unique passphrase.
Which of the following is the best example of a strong and memorable password? -
ANSWERSElphant-Blue-42 (something Like this)
Why it is important to add two-step verification to all accounts that offer it? -
ANSWERSIt provides an extra layer of protection beyond just a password.
Which of the following is an example of two-step verification? - ANSWERSA one-time
code sent via text message to your mobile device.
What is the purpose of a password manager? - ANSWERSThe secure storage and
retrieval of multiple passwords.
Felicia in Human Resources receives an urgent email from her boss stating that the
database containing all employees' tax information is inaccessible. She is asked to reply
with all employees' tax information to avoid paying substantial late fees. What should
she do? - ANSWERSCall her boss to confirm whether her boss sent the email
requesting employee tax information. You receive an email that appears to come from
the help desk asking for your password so a critical update can be installed on your