Security Troubleshooting Flashcards Preview

CompTia A+ Software Part 2 > Security Troubleshooting > Flashcards

Flashcards in Security Troubleshooting Deck (5):
1

While browsing the Internet, a pop-up browser window is displayed warning that your sister infected with a virus. You would direct them to click a link to scan for and remove the virus. What should you do? (Select two)

– Close the pop-up window and ignore the warning
– Use a search engine on Internet to learn how to manually remove the virus
– Update the virus definitions for locally installed antivirus software
– Click on the link provided to scan for and remove the virus
– Run a full system scan using the antivirus software installed on your system

Update the virus definitions for locally installed antivirus software
– Run a full system scan using the antivirus software installed on your system

2

Several employees have forwarded you an email indicating that your companies health insurance provider has just launched in your benefit management website that all employees must start using. The employees are told in the email to click the link to access the site. Once there, they are required to provide yourself security number. However, you'll have discovered that your companies insurance provider did not send this email. What kind of attack just occurred?

– Trojan horse
– Phishing
– Denial of service
– Piggyback

– Phishing

3

Which of the following are likely symptoms of malware infection? (Select two)

– Changed file permissions
– Receipt of phishing emails in your inbox
– Renamed system files
– Cookies placed my website recently visited
– Operating system updates that were installed without your knowledge

– Changed file permissions
– Renamed system files

4

Which techniques are used in a pharming attack to redirect legitimate web traffic to malicious websites? (Select two)

– Search engine result positioning
– Man in the middle attack
– Exploiting DHCP servers to deliver the IP address of poisoned DNS servers
– Dictionary attack
– Changing the host file of the users computer

– Exploiting DHCP servers to deliver the IP address of poisoned DNS servers
– Changing the host file of the users computer

5

What of following identify the key differences between the worm in a virus? (Select)

– Worms usually destroy data while viruses gather sensitive information
– Worms must be launched by some other process on the system
– A virus relies on a host for replication
– Worms independently replicate themselves
– Viruses must be lost by some other process on the system

– A virus relies on a host for replication
– Worms independently replicate themselves