Questions
The following is a short list of review questions to help reinforce your learning and help you identify areas that require some improvement. The answers to the questions can be found in the Assessments section at the end of this book:
- Which type of malware detection method is dependent on knowing the virus definition of the malware?
A. Anomaly-based
B. Behavior-based
C. Signature-based
D. Heuristics-based
- Which of the following can be used to filter traffic on a Linux device?
A. iptables
B. Windows Defender
C. Performance Monitor
D. None of the above
- Which of the following is used to disable a service on a Windows device?
A. Task Manager
B. Services control panel applet
C. Performance Monitor
D. All of the above
- Which of the following hives is responsible for storing information about the current user account?
A. HKEY_CLASSES_ROOT (HKCR)
B. HKEY_CURRENT_CONFIG (HKCC)
C. HKEY_USERS (HKU)
D. HKEY_CURRENT_USER (HKCU)
- In which of the following locations can a security...