1. Which characteristic describes Fileless malware?
- It uses legitimate programs to infect a computer.
- It displays an advertisement or popup that looks like an actual Windows warning.
- It records keystrokes to access passwords, confidential information, and spyware.
- It uses the IP addresses of known phishing websites.
2. True or False:
A host intrusion detection system cannot monitor network traffic that does not reach the host system.
- True
- False
3. Which host based network security device combines a traditional firewall with other network-device-filtering functions like DPI?
- EDR
- HIDS
- NGFW
- HIPS
4. Which Microsoft tool can be used to encrypt removable drives without the use of a TPM chip?
- BitLocker To Go
- MRT
- BitLocker
- XProtect
5. What is the purpose of the TPM chip on the motherboard?
- It stores information about the host system, such as encryption keys, digital certificates and passwords.
- It is used to encrypt the entire contents of a drive (including temporary files and memory).
- It is used to scan for keylogging malware installed on the system.
- It is used to detect fileless viruses using scripting languages such as Windows PowerShell.
6. Which Apple security feature protects low-level hardware and only allows genuine and unaltered Apple OS software to run?
- Secure Boot
- MRT
- XProtect
- Gatekeeper