OD41

5 November 2025

CompTIA A+ Core 2: Malware, Social Engineering, & Removal Steps

 

Question:

Which first step is recommended when attempting to remove a malware infection from a device?

  • Isolate the system


Question

:

Which mobile device vulnerability can expose it to software installations from any source?

  • Jailbreaking


Question

:

Which Windows security feature can be used to harden a system at the BIOS/UEFI level?

  • Secure boot


Question

:

Which statements correctly describe the role of end-users in cybersecurity?

  • Human error is among the leading causes of security breaches

  • They are the first line of defence, but the most common point of failure

  • Empowering users with knowledge and awareness reduces risk


Question

:

Which type of phishing is targeted at specific and high-level entity, such as an administrator?

  • Whaling


Question

:

Why is sandboxing an effective technique for helping to combat malware?

  • It allows you to observe malware behavior without risk to production systems


Question

:

Which type of malware is designed to operate at a very low level to avoid detection?

  • Rootkit


Question

:

Why is it typically recommended to not pay the ransom if successfully attacked?

  • There is no guarantee of data recovery

  • You may be attacked again


Question

:

By which method can you configure regularly scheduled malware scans in Windows Defender?

  • Task scheduler