Which first step is recommended when attempting to remove a malware infection from a device?
Isolate the system
:
Which mobile device vulnerability can expose it to software installations from any source?
Jailbreaking
:
Which Windows security feature can be used to harden a system at the BIOS/UEFI level?
Secure boot
:
Which statements correctly describe the role of end-users in cybersecurity?
Human error is among the leading causes of security breaches
They are the first line of defence, but the most common point of failure
Empowering users with knowledge and awareness reduces risk
:
Which type of phishing is targeted at specific and high-level entity, such as an administrator?
Whaling
:
Why is sandboxing an effective technique for helping to combat malware?
It allows you to observe malware behavior without risk to production systems
:
Which type of malware is designed to operate at a very low level to avoid detection?
Rootkit
:
Why is it typically recommended to not pay the ransom if successfully attacked?
There is no guarantee of data recovery
You may be attacked again
:
By which method can you configure regularly scheduled malware scans in Windows Defender?
Task scheduler






.png)