Question
                Which of the following is not an example of malicious code?
(1 point)
Responses
Trojan horse
Trojan horse
worm
worm
virus
virus
spy gear
            
        (1 point)
Responses
Trojan horse
Trojan horse
worm
worm
virus
virus
spy gear
Answers
                    Answer
            
    What is malware short for?
(1 point)
Responses
malingered software
malingered software
Maltese hardware
Maltese hardware
malicious software
malicious software
malfunctioning hardware
    
(1 point)
Responses
malingered software
malingered software
Maltese hardware
Maltese hardware
malicious software
malicious software
malfunctioning hardware
                    Answer
            
    Which of the following is a sign that your computer may have been infected with malicious code?
(1 point)
Responses
Your computer runs faster than normal.
Your computer runs faster than normal.
The pages you open are not distorted.
The pages you open are not distorted.
Your computer restarts on its own and then runs properly.
Your computer restarts on its own and then runs properly.
Your computer locks up or stops responding.
    
(1 point)
Responses
Your computer runs faster than normal.
Your computer runs faster than normal.
The pages you open are not distorted.
The pages you open are not distorted.
Your computer restarts on its own and then runs properly.
Your computer restarts on its own and then runs properly.
Your computer locks up or stops responding.
                    Answer
            
    Which of the following helps prevent your computer from becoming infected with malicious code?
(1 point)
Responses
Open all e-mails with attachments that are sent from strangers.
Open all e-mails with attachments that are sent from strangers.
Ensure your computer gets opened up and the dust cleaned out of it regularly.
Ensure your computer gets opened up and the dust cleaned out of it regularly.
Install and regularly run updated antivirus software.
Install and regularly run updated antivirus software.
Download and install software from the Internet, regardless of whether it has been proven to come from a safe and secure site.
    
(1 point)
Responses
Open all e-mails with attachments that are sent from strangers.
Open all e-mails with attachments that are sent from strangers.
Ensure your computer gets opened up and the dust cleaned out of it regularly.
Ensure your computer gets opened up and the dust cleaned out of it regularly.
Install and regularly run updated antivirus software.
Install and regularly run updated antivirus software.
Download and install software from the Internet, regardless of whether it has been proven to come from a safe and secure site.
Submit Your Answer
We prioritize human answers over AI answers.
If you are human, and you can answer this question, please submit your answer.