Virus Attacks and How to Defend
What is heuristic scanning?
Scanning using a rules-based approach
What malicious activity did the Rombertik virus attempt?
It overwrote the master boot record
Which of the following should be the least important consideration when purchasing antivirus software?
Cost
The first known ransomware was the 1995 PC Trojan
False
In the event of a virus infection, the first priority is to contact the IT department.
False, the first priority is to stop the spread of the infection
What is the most common method of virus propagation?
Through e-mail attachments
In the context of viruses what is a .dat file?
A file with virus definitions
The unfortunate side effect of heuristic scanning is that it can easily lead to false positives
True
What is active code scanning?
Scanning for active web elements (scripts, ActiveX, and so on)
Which of the below are famous Trojan Horses?
Netbus, Finfisher
Last updated