SlideShare a Scribd company logo
Question 16 (1 point)
Which of the following best describes the difference between a virus and a worm?
Question 16 options:
A worm is malicious software that requires a host file to spread itself, whereas a virus is
malicious software that does not require a host file to spread itself.
A virus is malicious software that requires a host file to spread itself, whereas a worm is
malicious software that does not require a host file to spread itself.
A virus is malicious software that attaches itself to executable files, whereas a worm is malicious
software that attaches itself to an image file.
There is no difference between a virus and a worm.
Question 17 (1 point)
Which of the following is an example of a malware prevention control?
Question 17 options:
Not allowing users to have administrative rights to their workstations
User awareness to recognize and report suspicious activity
Real-time firewall detection of suspicious file downloads
Review and analysis of log files
Question 18 (1 point)
Which of the following statements about Trojans is true?
Question 18 options:
Trojans need user interaction to spread.
Trojans are legitimate programs that enhance user experience.
Trojans reproduce by infecting other files.
Trojans self-replicate.
Question 19 (1 point)
Which of the following statements best describes data replication?
Question 19 options:
The process of copying data to a second location that is available for immediate use
The process of copying and storing data that could be restored to its original location
The process of copying data to another drive weekly
The process of copying data to the cloud
Question 20 (1 point)
Which of the following statements about data backup is not true?
Question 20 options:
Backups do not have to be restored as long as they are stored in the cloud.
Backups can be stored to a tape.
Backups can be stored in the cloud.
Backups can be conducted once a week.
Question 21 (1 point)
Which of the following statements about antivirus software is not true?
Question 21 options:
Antivirus software can detect, contain, or eliminate malware.
Antivirus software can detect various types of malware.
Antivirus software is 100 percent effective against malware intrusions.
Antivirus software uses signature-based recognition and behavior-based recognition to detect
malware.
Question 22 (1 point)
Which of the following malware takes advantage of a security vulnerability on the same day that
the vulnerability becomes known to the public?
Question 22 options:
Bot
Screen scraper
Ransomware
Zero-day exploit
Question 23 (1 point)
Which of the following is a snippet of code designed to automate tasks and often used by
attackers to carry out denial-of-service attacks?
Question 23 options:
Ransomware
Screen scraper
Zero-day exploit
Bot
Question 24 (1 point)
Which of the following is an example of ransomware that takes a computer or its data hostage in
an effort to extort money from victims?
Question 24 options:
WannaCry
Slammer
Sapphire
SpyEye
Question 25 (1 point)
Which of the following best describes the log analysis technique called trend analysis?
Question 25 options:
Compares log data to known good activity
Compares log data to known bad activity
Identifies activity over time that in isolation might appear normal
Ties individual entries together based on related information
Question 26 (1 point)
Which of the following log analysis techniques compares the log entries against a set of known
bad activity?
Question 26 options:
Trend analysis
Sequencing analysis
Correlation analysis
Signature analysis
Question 27 (1 point)
Which common standard operating procedure (SOP) format should be used for long procedures
requiring many decisions?
Question 27 options:
Flowchart
Simple step
Graphical
Hierarchical
Question 28 (1 point)
Which of the following refers to an internal procedure by which authorized changes are made to
software, hardware, network access privileges, or business processes?
Question 28 options:
NIST framework
Change control
Patch management
Standard operating procedure
Question 29 (1 point)
Which of the following is the standard protocol for sending email messages?
Question 29 options:
SMTP
FTP
SSL
IPsec
Question 30 (1 point)
Which of the following describes the process or methodology used to assess the adequacy of a
service provider?
Question 30 options:
Sequencing
Due care
Due diligence
Trend analysis
A worm is malicious software that requires a host file to spread itself, whereas a virus is
malicious software that does not require a host file to spread itself.
A virus is malicious software that requires a host file to spread itself, whereas a worm is
malicious software that does not require a host file to spread itself.
A virus is malicious software that attaches itself to executable files, whereas a worm is
malicious software that attaches itself to an image file.
There is no difference between a virus and a worm.
Question 16 (1 point)   Which of the following best describes the diff.pdf

More Related Content

Similar to Question 16 (1 point) Which of the following best describes the diff.pdf

Cis 333 Extraordinary Success/newtonhelp.com
Cis 333 Extraordinary Success/newtonhelp.com  Cis 333 Extraordinary Success/newtonhelp.com
Cis 333 Extraordinary Success/newtonhelp.com
amaranthbeg146
 
CIS 349 RANK Achievement Education--cis349rank.com
CIS 349 RANK Achievement Education--cis349rank.comCIS 349 RANK Achievement Education--cis349rank.com
CIS 349 RANK Achievement Education--cis349rank.com
claric154
 
CIS 333 Imagine Your Future/newtonhelp.com   
CIS 333 Imagine Your Future/newtonhelp.com   CIS 333 Imagine Your Future/newtonhelp.com   
CIS 333 Imagine Your Future/newtonhelp.com   
bellflower45
 
CIS 349 RANK Become Exceptional--cis349rank.com
CIS 349 RANK Become Exceptional--cis349rank.comCIS 349 RANK Become Exceptional--cis349rank.com
CIS 349 RANK Become Exceptional--cis349rank.com
claric103
 
CIS 333 Effective Communication - tutorialrank.com
CIS 333  Effective Communication - tutorialrank.comCIS 333  Effective Communication - tutorialrank.com
CIS 333 Effective Communication - tutorialrank.com
Bartholomew19
 
Cis 349 Teaching Effectively--tutorialrank.com
Cis 349 Teaching Effectively--tutorialrank.comCis 349 Teaching Effectively--tutorialrank.com
Cis 349 Teaching Effectively--tutorialrank.com
Soaps82
 
Cis 333 Education Organization / snaptutorial.com
Cis 333   Education Organization / snaptutorial.comCis 333   Education Organization / snaptutorial.com
Cis 333 Education Organization / snaptutorial.com
Baileya82
 
Network security interview questions & answers
Network security interview questions & answersNetwork security interview questions & answers
Network security interview questions & answers
Simpliv LLC
 
Slide Intervento Zanero Giornata del Perito 2015
Slide Intervento Zanero Giornata del Perito 2015Slide Intervento Zanero Giornata del Perito 2015
Slide Intervento Zanero Giornata del Perito 2015
LegolasTheElf
 
20160831_app_storesecurity_Seminar
20160831_app_storesecurity_Seminar20160831_app_storesecurity_Seminar
20160831_app_storesecurity_Seminar
Jisoo Park
 
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE - ATT&CKcon
 
CIS 349 RANK Inspiring Innovation--cis349rank.com
CIS 349 RANK Inspiring Innovation--cis349rank.comCIS 349 RANK Inspiring Innovation--cis349rank.com
CIS 349 RANK Inspiring Innovation--cis349rank.com
KeatonJennings91
 
CIS 349 RANK Lessons in Excellence--cis349rank.com
CIS 349 RANK Lessons in Excellence--cis349rank.comCIS 349 RANK Lessons in Excellence--cis349rank.com
CIS 349 RANK Lessons in Excellence--cis349rank.com
RoelofMerwe139
 
CIS 349 Effective Communication/tutorialrank.com
 CIS 349 Effective Communication/tutorialrank.com CIS 349 Effective Communication/tutorialrank.com
CIS 349 Effective Communication/tutorialrank.com
jonhson185
 
CIS 333 Exceptional Education / snaptutorial.com
CIS 333 Exceptional Education / snaptutorial.comCIS 333 Exceptional Education / snaptutorial.com
CIS 333 Exceptional Education / snaptutorial.com
donaldzs97
 
Cis 333 Enhance teaching / snaptutorial.com
Cis 333   Enhance teaching / snaptutorial.comCis 333   Enhance teaching / snaptutorial.com
Cis 333 Enhance teaching / snaptutorial.com
Davis104
 
CIS 349 Imagine Your Future/newtonhelp.com   
CIS 349 Imagine Your Future/newtonhelp.com   CIS 349 Imagine Your Future/newtonhelp.com   
CIS 349 Imagine Your Future/newtonhelp.com   
bellflower46
 
Short definitions of all testing types
Short definitions of all testing typesShort definitions of all testing types
Short definitions of all testing types
Garuda Trainings
 
Intelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software SecurityIntelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software SecurityTyler Shields
 
Why Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of DefenseWhy Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of Defense
Lumension
 

Similar to Question 16 (1 point) Which of the following best describes the diff.pdf (20)

Cis 333 Extraordinary Success/newtonhelp.com
Cis 333 Extraordinary Success/newtonhelp.com  Cis 333 Extraordinary Success/newtonhelp.com
Cis 333 Extraordinary Success/newtonhelp.com
 
CIS 349 RANK Achievement Education--cis349rank.com
CIS 349 RANK Achievement Education--cis349rank.comCIS 349 RANK Achievement Education--cis349rank.com
CIS 349 RANK Achievement Education--cis349rank.com
 
CIS 333 Imagine Your Future/newtonhelp.com   
CIS 333 Imagine Your Future/newtonhelp.com   CIS 333 Imagine Your Future/newtonhelp.com   
CIS 333 Imagine Your Future/newtonhelp.com   
 
CIS 349 RANK Become Exceptional--cis349rank.com
CIS 349 RANK Become Exceptional--cis349rank.comCIS 349 RANK Become Exceptional--cis349rank.com
CIS 349 RANK Become Exceptional--cis349rank.com
 
CIS 333 Effective Communication - tutorialrank.com
CIS 333  Effective Communication - tutorialrank.comCIS 333  Effective Communication - tutorialrank.com
CIS 333 Effective Communication - tutorialrank.com
 
Cis 349 Teaching Effectively--tutorialrank.com
Cis 349 Teaching Effectively--tutorialrank.comCis 349 Teaching Effectively--tutorialrank.com
Cis 349 Teaching Effectively--tutorialrank.com
 
Cis 333 Education Organization / snaptutorial.com
Cis 333   Education Organization / snaptutorial.comCis 333   Education Organization / snaptutorial.com
Cis 333 Education Organization / snaptutorial.com
 
Network security interview questions & answers
Network security interview questions & answersNetwork security interview questions & answers
Network security interview questions & answers
 
Slide Intervento Zanero Giornata del Perito 2015
Slide Intervento Zanero Giornata del Perito 2015Slide Intervento Zanero Giornata del Perito 2015
Slide Intervento Zanero Giornata del Perito 2015
 
20160831_app_storesecurity_Seminar
20160831_app_storesecurity_Seminar20160831_app_storesecurity_Seminar
20160831_app_storesecurity_Seminar
 
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
 
CIS 349 RANK Inspiring Innovation--cis349rank.com
CIS 349 RANK Inspiring Innovation--cis349rank.comCIS 349 RANK Inspiring Innovation--cis349rank.com
CIS 349 RANK Inspiring Innovation--cis349rank.com
 
CIS 349 RANK Lessons in Excellence--cis349rank.com
CIS 349 RANK Lessons in Excellence--cis349rank.comCIS 349 RANK Lessons in Excellence--cis349rank.com
CIS 349 RANK Lessons in Excellence--cis349rank.com
 
CIS 349 Effective Communication/tutorialrank.com
 CIS 349 Effective Communication/tutorialrank.com CIS 349 Effective Communication/tutorialrank.com
CIS 349 Effective Communication/tutorialrank.com
 
CIS 333 Exceptional Education / snaptutorial.com
CIS 333 Exceptional Education / snaptutorial.comCIS 333 Exceptional Education / snaptutorial.com
CIS 333 Exceptional Education / snaptutorial.com
 
Cis 333 Enhance teaching / snaptutorial.com
Cis 333   Enhance teaching / snaptutorial.comCis 333   Enhance teaching / snaptutorial.com
Cis 333 Enhance teaching / snaptutorial.com
 
CIS 349 Imagine Your Future/newtonhelp.com   
CIS 349 Imagine Your Future/newtonhelp.com   CIS 349 Imagine Your Future/newtonhelp.com   
CIS 349 Imagine Your Future/newtonhelp.com   
 
Short definitions of all testing types
Short definitions of all testing typesShort definitions of all testing types
Short definitions of all testing types
 
Intelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software SecurityIntelligence on the Intractable Problem of Software Security
Intelligence on the Intractable Problem of Software Security
 
Why Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of DefenseWhy Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of Defense
 

More from mail231065

question 2 and 3 Lymphocytes and antibodies are the immune system- pas.pdf
question 2 and 3 Lymphocytes and antibodies are the immune system- pas.pdfquestion 2 and 3 Lymphocytes and antibodies are the immune system- pas.pdf
question 2 and 3 Lymphocytes and antibodies are the immune system- pas.pdf
mail231065
 
Question 2 1 pts What is the purpose of alt attribute with the image t.pdf
Question 2 1 pts What is the purpose of alt attribute with the image t.pdfQuestion 2 1 pts What is the purpose of alt attribute with the image t.pdf
Question 2 1 pts What is the purpose of alt attribute with the image t.pdf
mail231065
 
Question 2 Evaluate the advantages and disadvantages of the entry mode.pdf
Question 2 Evaluate the advantages and disadvantages of the entry mode.pdfQuestion 2 Evaluate the advantages and disadvantages of the entry mode.pdf
Question 2 Evaluate the advantages and disadvantages of the entry mode.pdf
mail231065
 
Question 2 1 pts Consider the tree diagram from the previous question-.pdf
Question 2 1 pts Consider the tree diagram from the previous question-.pdfQuestion 2 1 pts Consider the tree diagram from the previous question-.pdf
Question 2 1 pts Consider the tree diagram from the previous question-.pdf
mail231065
 
QUESTION 2 A research design measures.pdf
QUESTION 2 A                                  research design measures.pdfQUESTION 2 A                                  research design measures.pdf
QUESTION 2 A research design measures.pdf
mail231065
 
Question 2 (20 Marks) Identify FIVE (5) stakeholders and provide a det.pdf
Question 2 (20 Marks) Identify FIVE (5) stakeholders and provide a det.pdfQuestion 2 (20 Marks) Identify FIVE (5) stakeholders and provide a det.pdf
Question 2 (20 Marks) Identify FIVE (5) stakeholders and provide a det.pdf
mail231065
 
QUESTION 16 Which of the following algorithms is correct for applying.pdf
QUESTION 16 Which of the following algorithms is correct for applying.pdfQUESTION 16 Which of the following algorithms is correct for applying.pdf
QUESTION 16 Which of the following algorithms is correct for applying.pdf
mail231065
 
QUESTION 2 (12 MARKS) 2-1 Why is pollination important- 2-2 Describe h.pdf
QUESTION 2 (12 MARKS) 2-1 Why is pollination important- 2-2 Describe h.pdfQUESTION 2 (12 MARKS) 2-1 Why is pollination important- 2-2 Describe h.pdf
QUESTION 2 (12 MARKS) 2-1 Why is pollination important- 2-2 Describe h.pdf
mail231065
 
QUESTION 15 According to the Harris and Todaro model- when the populat.pdf
QUESTION 15 According to the Harris and Todaro model- when the populat.pdfQUESTION 15 According to the Harris and Todaro model- when the populat.pdf
QUESTION 15 According to the Harris and Todaro model- when the populat.pdf
mail231065
 
Question 17 - For items that are manufactured or produced within the c.pdf
Question 17 - For items that are manufactured or produced within the c.pdfQuestion 17 - For items that are manufactured or produced within the c.pdf
Question 17 - For items that are manufactured or produced within the c.pdf
mail231065
 
Question 15 010-5pts Which of the following is true of the diaphysis-.pdf
Question 15 010-5pts Which of the following is true of the diaphysis-.pdfQuestion 15 010-5pts Which of the following is true of the diaphysis-.pdf
Question 15 010-5pts Which of the following is true of the diaphysis-.pdf
mail231065
 
Question 14 options- Ling Yu Company records their business transactio.pdf
Question 14 options- Ling Yu Company records their business transactio.pdfQuestion 14 options- Ling Yu Company records their business transactio.pdf
Question 14 options- Ling Yu Company records their business transactio.pdf
mail231065
 
Question 14 (1 point) What is an intranet- Question 14 options-.pdf
Question 14 (1 point)   What is an intranet- Question 14 options-.pdfQuestion 14 (1 point)   What is an intranet- Question 14 options-.pdf
Question 14 (1 point) What is an intranet- Question 14 options-.pdf
mail231065
 
Question 12 2-5-3 points Which part(s) of the brain play a large role.pdf
Question 12 2-5-3 points Which part(s) of the brain play a large role.pdfQuestion 12 2-5-3 points Which part(s) of the brain play a large role.pdf
Question 12 2-5-3 points Which part(s) of the brain play a large role.pdf
mail231065
 
Question 12 (1 point) Despite their differences- all environmentalis.pdf
Question 12 (1 point)   Despite their differences- all environmentalis.pdfQuestion 12 (1 point)   Despite their differences- all environmentalis.pdf
Question 12 (1 point) Despite their differences- all environmentalis.pdf
mail231065
 
Question 12 Refer to the diagram for a private closed economy- The upw.pdf
Question 12 Refer to the diagram for a private closed economy- The upw.pdfQuestion 12 Refer to the diagram for a private closed economy- The upw.pdf
Question 12 Refer to the diagram for a private closed economy- The upw.pdf
mail231065
 
Question 10 What is the output from the following program- void main().pdf
Question 10 What is the output from the following program- void main().pdfQuestion 10 What is the output from the following program- void main().pdf
Question 10 What is the output from the following program- void main().pdf
mail231065
 
Question 11 (1 point) Why was the cultivation of hay considered one of (1).pdf
Question 11 (1 point) Why was the cultivation of hay considered one of (1).pdfQuestion 11 (1 point) Why was the cultivation of hay considered one of (1).pdf
Question 11 (1 point) Why was the cultivation of hay considered one of (1).pdf
mail231065
 
Question 12 ( 1 point) Saved According to the phylogenetic tree in th.pdf
Question 12 ( 1 point)  Saved According to the phylogenetic tree in th.pdfQuestion 12 ( 1 point)  Saved According to the phylogenetic tree in th.pdf
Question 12 ( 1 point) Saved According to the phylogenetic tree in th.pdf
mail231065
 
Question 1-5 - Thinking a Little More About Hashing Consider the appli.pdf
Question 1-5 - Thinking a Little More About Hashing Consider the appli.pdfQuestion 1-5 - Thinking a Little More About Hashing Consider the appli.pdf
Question 1-5 - Thinking a Little More About Hashing Consider the appli.pdf
mail231065
 

More from mail231065 (20)

question 2 and 3 Lymphocytes and antibodies are the immune system- pas.pdf
question 2 and 3 Lymphocytes and antibodies are the immune system- pas.pdfquestion 2 and 3 Lymphocytes and antibodies are the immune system- pas.pdf
question 2 and 3 Lymphocytes and antibodies are the immune system- pas.pdf
 
Question 2 1 pts What is the purpose of alt attribute with the image t.pdf
Question 2 1 pts What is the purpose of alt attribute with the image t.pdfQuestion 2 1 pts What is the purpose of alt attribute with the image t.pdf
Question 2 1 pts What is the purpose of alt attribute with the image t.pdf
 
Question 2 Evaluate the advantages and disadvantages of the entry mode.pdf
Question 2 Evaluate the advantages and disadvantages of the entry mode.pdfQuestion 2 Evaluate the advantages and disadvantages of the entry mode.pdf
Question 2 Evaluate the advantages and disadvantages of the entry mode.pdf
 
Question 2 1 pts Consider the tree diagram from the previous question-.pdf
Question 2 1 pts Consider the tree diagram from the previous question-.pdfQuestion 2 1 pts Consider the tree diagram from the previous question-.pdf
Question 2 1 pts Consider the tree diagram from the previous question-.pdf
 
QUESTION 2 A research design measures.pdf
QUESTION 2 A                                  research design measures.pdfQUESTION 2 A                                  research design measures.pdf
QUESTION 2 A research design measures.pdf
 
Question 2 (20 Marks) Identify FIVE (5) stakeholders and provide a det.pdf
Question 2 (20 Marks) Identify FIVE (5) stakeholders and provide a det.pdfQuestion 2 (20 Marks) Identify FIVE (5) stakeholders and provide a det.pdf
Question 2 (20 Marks) Identify FIVE (5) stakeholders and provide a det.pdf
 
QUESTION 16 Which of the following algorithms is correct for applying.pdf
QUESTION 16 Which of the following algorithms is correct for applying.pdfQUESTION 16 Which of the following algorithms is correct for applying.pdf
QUESTION 16 Which of the following algorithms is correct for applying.pdf
 
QUESTION 2 (12 MARKS) 2-1 Why is pollination important- 2-2 Describe h.pdf
QUESTION 2 (12 MARKS) 2-1 Why is pollination important- 2-2 Describe h.pdfQUESTION 2 (12 MARKS) 2-1 Why is pollination important- 2-2 Describe h.pdf
QUESTION 2 (12 MARKS) 2-1 Why is pollination important- 2-2 Describe h.pdf
 
QUESTION 15 According to the Harris and Todaro model- when the populat.pdf
QUESTION 15 According to the Harris and Todaro model- when the populat.pdfQUESTION 15 According to the Harris and Todaro model- when the populat.pdf
QUESTION 15 According to the Harris and Todaro model- when the populat.pdf
 
Question 17 - For items that are manufactured or produced within the c.pdf
Question 17 - For items that are manufactured or produced within the c.pdfQuestion 17 - For items that are manufactured or produced within the c.pdf
Question 17 - For items that are manufactured or produced within the c.pdf
 
Question 15 010-5pts Which of the following is true of the diaphysis-.pdf
Question 15 010-5pts Which of the following is true of the diaphysis-.pdfQuestion 15 010-5pts Which of the following is true of the diaphysis-.pdf
Question 15 010-5pts Which of the following is true of the diaphysis-.pdf
 
Question 14 options- Ling Yu Company records their business transactio.pdf
Question 14 options- Ling Yu Company records their business transactio.pdfQuestion 14 options- Ling Yu Company records their business transactio.pdf
Question 14 options- Ling Yu Company records their business transactio.pdf
 
Question 14 (1 point) What is an intranet- Question 14 options-.pdf
Question 14 (1 point)   What is an intranet- Question 14 options-.pdfQuestion 14 (1 point)   What is an intranet- Question 14 options-.pdf
Question 14 (1 point) What is an intranet- Question 14 options-.pdf
 
Question 12 2-5-3 points Which part(s) of the brain play a large role.pdf
Question 12 2-5-3 points Which part(s) of the brain play a large role.pdfQuestion 12 2-5-3 points Which part(s) of the brain play a large role.pdf
Question 12 2-5-3 points Which part(s) of the brain play a large role.pdf
 
Question 12 (1 point) Despite their differences- all environmentalis.pdf
Question 12 (1 point)   Despite their differences- all environmentalis.pdfQuestion 12 (1 point)   Despite their differences- all environmentalis.pdf
Question 12 (1 point) Despite their differences- all environmentalis.pdf
 
Question 12 Refer to the diagram for a private closed economy- The upw.pdf
Question 12 Refer to the diagram for a private closed economy- The upw.pdfQuestion 12 Refer to the diagram for a private closed economy- The upw.pdf
Question 12 Refer to the diagram for a private closed economy- The upw.pdf
 
Question 10 What is the output from the following program- void main().pdf
Question 10 What is the output from the following program- void main().pdfQuestion 10 What is the output from the following program- void main().pdf
Question 10 What is the output from the following program- void main().pdf
 
Question 11 (1 point) Why was the cultivation of hay considered one of (1).pdf
Question 11 (1 point) Why was the cultivation of hay considered one of (1).pdfQuestion 11 (1 point) Why was the cultivation of hay considered one of (1).pdf
Question 11 (1 point) Why was the cultivation of hay considered one of (1).pdf
 
Question 12 ( 1 point) Saved According to the phylogenetic tree in th.pdf
Question 12 ( 1 point)  Saved According to the phylogenetic tree in th.pdfQuestion 12 ( 1 point)  Saved According to the phylogenetic tree in th.pdf
Question 12 ( 1 point) Saved According to the phylogenetic tree in th.pdf
 
Question 1-5 - Thinking a Little More About Hashing Consider the appli.pdf
Question 1-5 - Thinking a Little More About Hashing Consider the appli.pdfQuestion 1-5 - Thinking a Little More About Hashing Consider the appli.pdf
Question 1-5 - Thinking a Little More About Hashing Consider the appli.pdf
 

Recently uploaded

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 

Recently uploaded (20)

"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 

Question 16 (1 point) Which of the following best describes the diff.pdf

  • 1. Question 16 (1 point) Which of the following best describes the difference between a virus and a worm? Question 16 options: A worm is malicious software that requires a host file to spread itself, whereas a virus is malicious software that does not require a host file to spread itself. A virus is malicious software that requires a host file to spread itself, whereas a worm is malicious software that does not require a host file to spread itself. A virus is malicious software that attaches itself to executable files, whereas a worm is malicious software that attaches itself to an image file. There is no difference between a virus and a worm. Question 17 (1 point) Which of the following is an example of a malware prevention control? Question 17 options: Not allowing users to have administrative rights to their workstations User awareness to recognize and report suspicious activity Real-time firewall detection of suspicious file downloads Review and analysis of log files Question 18 (1 point) Which of the following statements about Trojans is true? Question 18 options: Trojans need user interaction to spread. Trojans are legitimate programs that enhance user experience. Trojans reproduce by infecting other files. Trojans self-replicate. Question 19 (1 point)
  • 2. Which of the following statements best describes data replication? Question 19 options: The process of copying data to a second location that is available for immediate use The process of copying and storing data that could be restored to its original location The process of copying data to another drive weekly The process of copying data to the cloud Question 20 (1 point) Which of the following statements about data backup is not true? Question 20 options: Backups do not have to be restored as long as they are stored in the cloud. Backups can be stored to a tape. Backups can be stored in the cloud. Backups can be conducted once a week. Question 21 (1 point) Which of the following statements about antivirus software is not true? Question 21 options: Antivirus software can detect, contain, or eliminate malware. Antivirus software can detect various types of malware. Antivirus software is 100 percent effective against malware intrusions. Antivirus software uses signature-based recognition and behavior-based recognition to detect malware. Question 22 (1 point) Which of the following malware takes advantage of a security vulnerability on the same day that the vulnerability becomes known to the public?
  • 3. Question 22 options: Bot Screen scraper Ransomware Zero-day exploit Question 23 (1 point) Which of the following is a snippet of code designed to automate tasks and often used by attackers to carry out denial-of-service attacks? Question 23 options: Ransomware Screen scraper Zero-day exploit Bot Question 24 (1 point) Which of the following is an example of ransomware that takes a computer or its data hostage in an effort to extort money from victims? Question 24 options: WannaCry Slammer Sapphire SpyEye Question 25 (1 point) Which of the following best describes the log analysis technique called trend analysis? Question 25 options:
  • 4. Compares log data to known good activity Compares log data to known bad activity Identifies activity over time that in isolation might appear normal Ties individual entries together based on related information Question 26 (1 point) Which of the following log analysis techniques compares the log entries against a set of known bad activity? Question 26 options: Trend analysis Sequencing analysis Correlation analysis Signature analysis Question 27 (1 point) Which common standard operating procedure (SOP) format should be used for long procedures requiring many decisions? Question 27 options: Flowchart Simple step Graphical Hierarchical Question 28 (1 point) Which of the following refers to an internal procedure by which authorized changes are made to software, hardware, network access privileges, or business processes? Question 28 options: NIST framework
  • 5. Change control Patch management Standard operating procedure Question 29 (1 point) Which of the following is the standard protocol for sending email messages? Question 29 options: SMTP FTP SSL IPsec Question 30 (1 point) Which of the following describes the process or methodology used to assess the adequacy of a service provider? Question 30 options: Sequencing Due care Due diligence Trend analysis A worm is malicious software that requires a host file to spread itself, whereas a virus is malicious software that does not require a host file to spread itself. A virus is malicious software that requires a host file to spread itself, whereas a worm is malicious software that does not require a host file to spread itself. A virus is malicious software that attaches itself to executable files, whereas a worm is malicious software that attaches itself to an image file. There is no difference between a virus and a worm.