InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
What Is A Personal Firewall For? |
|
Answer» Incoming and OUTGOING PROTECTION. Protecting your computer from intrusion (scanning or attack) by hackers or script kiddies while it is CONNECTED to the Internet. Outgoing to prevent a trojan HORSE installed on your computer from "phoning" HOME. Incoming and outgoing protection. Protecting your computer from intrusion (scanning or attack) by hackers or script kiddies while it is connected to the Internet. Outgoing to prevent a trojan horse installed on your computer from "phoning" home. |
|
| 2. |
How Can I Practice Safe File Sharing? |
|
Answer» There’s REALLY no two-ways about it: safe file sharing is next to impossible. There are reputable sites that offer spy-free freeware but it’s difficult to investigate every free program to distinguish between the good and bad. Take these steps to fortify your computer security right away:
There’s really no two-ways about it: safe file sharing is next to impossible. There are reputable sites that offer spy-free freeware but it’s difficult to investigate every free program to distinguish between the good and bad. Take these steps to fortify your computer security right away: |
|
| 3. |
How Can I Safely Email And Im? |
|
Answer» Take these steps to fortify your email security and instant messaging security right away:
Take these steps to fortify your email security and instant messaging security right away: |
|
| 4. |
How Can I Safely Browse The Internet? |
|
Answer» Internet SAFETY can be deceiving. Seemingly reputable sites MAY CONTAIN spyware traps, or the sites themselves may be counterfeit -- phishing sites posing as the real thing to lure you into their scams and debacles. The path away from Internet safety often begins innocently enough; however, certain sites are more prone to be a source of spyware, including:
Take these steps to fortify your Internet safety and computer security right away:
Internet safety can be deceiving. Seemingly reputable sites may contain spyware traps, or the sites themselves may be counterfeit -- phishing sites posing as the real thing to lure you into their scams and debacles. The path away from Internet safety often begins innocently enough; however, certain sites are more prone to be a source of spyware, including: Take these steps to fortify your Internet safety and computer security right away: |
|
| 5. |
What Are The Symptoms Of Malware Infection? |
|
Answer» If you use the Internet, it’s very likely some FORM of malware threats are ALREADY at work on your PC. Your computer MAY be infected if you recognize any of these symptoms:
If you use the Internet, it’s very likely some form of malware threats are already at work on your PC. Your computer may be infected if you recognize any of these symptoms: |
|
| 6. |
What Can I Do About Hackers And Predators? |
|
Answer» To combat online predators:
Take these steps to fortify your computer security against hackers right away:
Practice safe email protocol:
To combat online predators: Take these steps to fortify your computer security against hackers right away: Practice safe email protocol: |
|
| 7. |
How Do Hackers And Predators Find Me? |
|
Answer» ANYONE who uses a computer connected to the INTERNET is susceptible to the threats hackers and predators pose. Hackers typically use phishing scams, spam email or instant messages and bogus Web sites to DELIVER spyware to your computer and compromise your computer security. Predators monitor your CHAT room CONVERSATIONS or peruse your personal Web page. Usually disguised with a bogus identity, predators can lure you into revealing sensitive personal and financial information, or much worse. Anyone who uses a computer connected to the Internet is susceptible to the threats hackers and predators pose. Hackers typically use phishing scams, spam email or instant messages and bogus Web sites to deliver spyware to your computer and compromise your computer security. Predators monitor your chat room conversations or peruse your personal Web page. Usually disguised with a bogus identity, predators can lure you into revealing sensitive personal and financial information, or much worse. |
|
| 8. |
How Are Hackers And Predators A Threat To Computer Security? |
|
Answer» People, not computers, create computer threats. Predators victimize others for their own gain. GIVE a predator access to the Internet – and likely to your PC -- and the threat they pose to your security increases exponentially. Hackers are programmers who break into computer SYSTEMS in order to steal, change or destroy information. Their CLEVER tactics and detailed technical KNOWLEDGE help them access information you REALLY don’t want them to have. People, not computers, create computer threats. Predators victimize others for their own gain. Give a predator access to the Internet – and likely to your PC -- and the threat they pose to your security increases exponentially. Hackers are programmers who break into computer systems in order to steal, change or destroy information. Their clever tactics and detailed technical knowledge help them access information you really don’t want them to have. |
|
| 9. |
How Can I Prevent Phishing? |
|
Answer» Take these steps to fortify you computer security against phishing scams right away:
Take these steps to fortify you computer security against phishing scams right away: |
|
| 10. |
What Is Phishing? |
|
Answer» Phishing is an online con game played by tech-savvy con artists and IDENTIFY thieves. They use spam, MALICIOUS Web sites, email and instant messages to trick you into divulging sensitive information, LIKE bank ACCOUNT passwords and credit card numbers. Phishing is an online con game played by tech-savvy con artists and identify thieves. They use spam, malicious Web sites, email and instant messages to trick you into divulging sensitive information, like bank account passwords and credit card numbers. |
|
| 11. |
What Is A Computer Virus? |
|
Answer» THINK of a biological virus – the KIND that makes you sick. It’s persistently nasty, keeps you from functioning normally and often requires something powerful to get rid of it. A computer virus delivered over the Internet is very SIMILAR. Designed to relentlessly REPLICATE, viruses infect your computer programs and files, alter the way your computer OPERATES or stop it from working altogether. Think of a biological virus – the kind that makes you sick. It’s persistently nasty, keeps you from functioning normally and often requires something powerful to get rid of it. A computer virus delivered over the Internet is very similar. Designed to relentlessly replicate, viruses infect your computer programs and files, alter the way your computer operates or stop it from working altogether. |
|
| 12. |
How Can I Prevent Spam? |
|
Answer» To prevent spam, use a spam filter or gateway to scan inbound messages. One simple way you can prevent spam DAMAGE is to practice safe email protocol:
To prevent spam, use a spam filter or gateway to scan inbound messages. One simple way you can prevent spam damage is to practice safe email protocol: |
|
| 13. |
What Is Spam? |
|
Answer» Spam is unsolicited commercial email. It's SENT, usually in bulk, through "open-relays" to millions of people. Spam is cost-shifted advertising. It takes a TOLL on Internet users' TIME, their resources, and the resources of Internet Service Providers (ISP). Most recently, spammers have begun to send advertisements via text MESSAGE to cell phones. Spam is unsolicited commercial email. It's sent, usually in bulk, through "open-relays" to millions of people. Spam is cost-shifted advertising. It takes a toll on Internet users' time, their resources, and the resources of Internet Service Providers (ISP). Most recently, spammers have begun to send advertisements via text message to cell phones. |
|
| 14. |
How Can I Prevent A Slow Pc? |
|
Answer» There are a few simple things you can do right away to prevent further spyware infection and speed your PC performance.
There are a few simple things you can do right away to prevent further spyware infection and speed your PC performance. |
|
| 15. |
Why Is My Pc Slow? |
|
Answer» Sluggish performance of vital computer PROGRAMS, like your operating system or INTERNET browser, is USUALLY caused by spyware infection that consumes a SUBSTANTIAL amount of computer memory, leaving LIMITED resources for other legitimate programs to use. Sluggish performance of vital computer programs, like your operating system or Internet browser, is usually caused by spyware infection that consumes a substantial amount of computer memory, leaving limited resources for other legitimate programs to use. |
|
| 16. |
How Can I Prevent Pop-ups And The Damage They Can Cause? |
|
Answer» There are a few simple things you can do right away to prevent further SPYWARE infection and avoid pop-ups.
There are a few simple things you can do right away to prevent further spyware infection and avoid pop-ups. |
|
| 17. |
What Are Pop-ups? |
|
Answer» Pop-ups are a FORM of online advertising intended to INCREASE Web traffic or CAPTURE email addresses. These online ads come in many forms, but generally they want to sell you something. While many pop-up ads from reputable companies are harmless, the adware programs that generate ILLEGITIMATE pop-ups are CAPABLE of installing spyware to hijack your browser and capture your personal information. Pop-ups are a form of online advertising intended to increase Web traffic or capture email addresses. These online ads come in many forms, but generally they want to sell you something. While many pop-up ads from reputable companies are harmless, the adware programs that generate illegitimate pop-ups are capable of installing spyware to hijack your browser and capture your personal information. |
|
| 18. |
How Can I Prevent Pc Crashes? |
|
Answer» There are a few simple things you can do right away to HELP prevent further spyware infection and stop frequent computer CRASHES:
There are a few simple things you can do right away to help prevent further spyware infection and stop frequent computer crashes: |
|
| 19. |
What Are Pc Crashes? |
|
Answer» Computer crashes happen when a program (either an application or part of the operating system) stops performing its EXPECTED function and stops responding to other PARTS of the system. OFTEN the offending program may simply APPEAR to freeze. If your computer shuts down frequently, detect spyware. Malicious threats may be at WORK, tracking your activities and stealing personal information. Computer crashes happen when a program (either an application or part of the operating system) stops performing its expected function and stops responding to other parts of the system. Often the offending program may simply appear to freeze. If your computer shuts down frequently, detect spyware. Malicious threats may be at work, tracking your activities and stealing personal information. |
|
| 20. |
How Can I Prevent Identity Theft? |
|
Answer» SPYWARE used for identity theft can be the most harmful and difficult to REMOVE of any type of spyware. There are a few things you can do right AWAY to protect yourself:
Spyware used for identity theft can be the most harmful and difficult to remove of any type of spyware. There are a few things you can do right away to protect yourself: |
|
| 21. |
What Is Identity Theft? |
|
Answer» Identity theft is the CRIMINAL abuse of consumers' personal IDENTIFIERS. The MAIN CONCERN for consumers is financial crimes exploiting their credit worthiness to commit loan fraud, mortgage fraud, lines-of-credit fraud, credit card fraud, commodities and services frauds. Many people associate identity theft with having a WALLET or purse stolen. But your your computer is fast becoming the most likely place where your identity can be stolen. Identity theft is the criminal abuse of consumers' personal identifiers. The main concern for consumers is financial crimes exploiting their credit worthiness to commit loan fraud, mortgage fraud, lines-of-credit fraud, credit card fraud, commodities and services frauds. Many people associate identity theft with having a wallet or purse stolen. But your your computer is fast becoming the most likely place where your identity can be stolen. |
|
| 22. |
How Can I Prevent Hijacked Homepages? |
|
Answer» There are a few simple things you can do RIGHT away to help prevent further SPYWARE infection and reclaim your homepage:
There are a few simple things you can do right away to help prevent further spyware infection and reclaim your homepage: |
|
| 23. |
What Is A Hijacked Homepage? |
|
Answer» Browser HIJACKER spyware resets your homepage so each time you LAUNCH your browser you LAND on the site it wants you to. Fraudsters use this method to force hits to their websites, since most sites have ads. More hits means higher costs for advertising, and ultimately more money for the spyware-toting villain. Browser hijackers are more than just ANNOYING: The spyware they carry can cause irreparable damage to your files and programs as well as jeopardize your personal information and identity. Browser hijacker spyware resets your homepage so each time you launch your browser you land on the site it wants you to. Fraudsters use this method to force hits to their websites, since most sites have ads. More hits means higher costs for advertising, and ultimately more money for the spyware-toting villain. Browser hijackers are more than just annoying: The spyware they carry can cause irreparable damage to your files and programs as well as jeopardize your personal information and identity. |
|
| 24. |
How Can I Prevent Credit Card Fraud? |
|
Answer» Proactively preventing the harm spyware can do to you and your computer is vastly LESS expensive than paying to restore your credit, your identity and your computer. Here are a few things you can do right away to prevent credit card fraud:
Practice safe email protocol:
Proactively preventing the harm spyware can do to you and your computer is vastly less expensive than paying to restore your credit, your identity and your computer. Here are a few things you can do right away to prevent credit card fraud: Practice safe email protocol: |
|
| 25. |
What Is Credit Card Fraud? |
|
Answer» When credit card fraud occurs, a MERCHANT (business, service provider, seller, etc.) is tricked into releasing MERCHANDISE or rendering services, believing that a credit card account will provide PAYMENT for goods or services. The merchant later learns they will not be paid, or that the payment they received will be reclaimed by the card's ISSUING bank. A fraudulent or STOLEN credit card is charged for a purchase. Today, half of all credit card fraud is conducted online using spyware. When credit card fraud occurs, a merchant (business, service provider, seller, etc.) is tricked into releasing merchandise or rendering services, believing that a credit card account will provide payment for goods or services. The merchant later learns they will not be paid, or that the payment they received will be reclaimed by the card's issuing bank. A fraudulent or stolen credit card is charged for a purchase. Today, half of all credit card fraud is conducted online using spyware. |
|
| 26. |
How Do I Remove Adware? |
|
Answer» First, you should use a spy scan program designed for spyware detection to see if you're infected. Once you know your infection level, you'll be able to take back control of your computer. Second, you can try to remove the spyware manually, but removal is a difficult and complicated PROCESS for even the most experienced computer user. Without recognized, top-quality anti-spyware software, spyware removal will be incomplete at best. Third, choose a spyware protection SOLUTION. A complete anti-spyware software package includes anti-spyware software, anti-virus protection and a firewall. Look for these qualities when selecting an anti-spyware software solution: Provides frequent VERSION and definition updates to combat the latest threats. Consistently WINS awards from industry-leading publications. Has a dedicated, round-the-clock research team devoted to tracking spyware evolution. Is backed by an INNOVATIVE company with a solid business reputation. First, you should use a spy scan program designed for spyware detection to see if you're infected. Once you know your infection level, you'll be able to take back control of your computer. Second, you can try to remove the spyware manually, but removal is a difficult and complicated process for even the most experienced computer user. Without recognized, top-quality anti-spyware software, spyware removal will be incomplete at best. Third, choose a spyware protection solution. A complete anti-spyware software package includes anti-spyware software, anti-virus protection and a firewall. Look for these qualities when selecting an anti-spyware software solution: Provides frequent version and definition updates to combat the latest threats. Consistently wins awards from industry-leading publications. Has a dedicated, round-the-clock research team devoted to tracking spyware evolution. Is backed by an innovative company with a solid business reputation. |
|
| 27. |
What Are The Symptoms Of An Adware Infection? |
|
Answer» Your PC MAY be infected with adware if you experience these symptoms:
Your PC may be infected with adware if you experience these symptoms: |
|
| 28. |
How Does Adware Work? |
|
Answer» Adware WATCHES as you surf the Internet to collect information about your behavior. Then adware disrupts your browsing by POPPING up context-related promotions right on top of your screen, causing you to second guess your next online move. Adware runs quietly in the BACKGROUND of your COMPUTER, observing your every move. It logs your online activities and personal information to create a USER profile and sends it to a data collection site. From there, your data is used to evaluate your surfing habits and send you targeted advertising. Adware watches as you surf the Internet to collect information about your behavior. Then adware disrupts your browsing by popping up context-related promotions right on top of your screen, causing you to second guess your next online move. Adware runs quietly in the background of your computer, observing your every move. It logs your online activities and personal information to create a user profile and sends it to a data collection site. From there, your data is used to evaluate your surfing habits and send you targeted advertising. |
|
| 29. |
What Is Adware? |
|
Answer» Adware is any SOFTWARE application that has the ability to display advertisements on your computer. Some adware can TRACK your SURFING habits to display targeted promotions on your WEB BROWSER in the form of pop-up, pop-under and banner ads. Adware is any software application that has the ability to display advertisements on your computer. Some adware can track your surfing habits to display targeted promotions on your Web browser in the form of pop-up, pop-under and banner ads. |
|
| 30. |
How Can I Spot A Legitimate Anti-malware Program? |
|
Answer» There are several easy ways to tell the difference between legitimate programs and rogue applications: Trustworthy anti-malware programs do not ADVERTISE in pop-up ads or on QUESTIONABLE Web SITES, such as gambling or pornographic sites. Any security application that appears on your machine that you did not knowingly download or install is questionable, and is likely an ILLEGITIMATE PROGRAM. The program’s scan results should tip you off. Rogue anti-spyware programs will report legitimate files and processes as spyware to scare you into thinking that you have several spies on your PC. Enter the product’s name in your favorite search engine, if results such as “Remove product name” appear, it is probably a questionable application. There are several easy ways to tell the difference between legitimate programs and rogue applications: Trustworthy anti-malware programs do not advertise in pop-up ads or on questionable Web sites, such as gambling or pornographic sites. Any security application that appears on your machine that you did not knowingly download or install is questionable, and is likely an illegitimate program. The program’s scan results should tip you off. Rogue anti-spyware programs will report legitimate files and processes as spyware to scare you into thinking that you have several spies on your PC. Enter the product’s name in your favorite search engine, if results such as “Remove product name” appear, it is probably a questionable application. |
|
| 31. |
What Should I Look For In Anti-malware Software? |
Answer»
|
|
| 32. |
Why Can't Free Applications Protect Me From Malware? |
|
Answer» Technically, FREE applications lack the capabilities to remove malicious, complex malware. They also are not backed by the resources available to track and eradicate the latest malware threats. Malware is growing RELENTLESSLY more SOPHISTICATED. Free applications just can't KEEP up. Technically, free applications lack the capabilities to remove malicious, complex malware. They also are not backed by the resources available to track and eradicate the latest malware threats. Malware is growing relentlessly more sophisticated. Free applications just can't keep up. |
|
| 33. |
Why Do I Need Anti-malware Protection? |
|
Answer» If you use a computer, you're susceptible to malware infection. In fact, nine out of 10 Internet-connected PCs are infected with spyware that can:
If you use a computer, you're susceptible to malware infection. In fact, nine out of 10 Internet-connected PCs are infected with spyware that can: |
|
| 34. |
How Can I Remove Malware? |
|
Answer» FIRST, you should use a scan program designed for malware detection to see if you're infected. Once you know your infection level, you'll be able to TAKE BACK control of your computer. Second, you can try to remove the malware manually, but removal is a difficult and complicated process for even the most experienced computer user. Without recognized, top-quality anti-malware software, malware removal will be incomplete at best. Third, choose a malware protection solution. A complete anti-malware software package includes anti-spyware software and anti-virus protection and should be fortified with a firewall. Look for these qualities when selecting an anti-malware software solution: Provides frequent version and definition updates to combat the latest THREATS. CONSISTENTLY wins awards from industry-leading publications. Has a dedicated, round-the-clock research team devoted to keeping track of malware evolution. Is backed by an innovative company with a solid business reputation. First, you should use a scan program designed for malware detection to see if you're infected. Once you know your infection level, you'll be able to take back control of your computer. Second, you can try to remove the malware manually, but removal is a difficult and complicated process for even the most experienced computer user. Without recognized, top-quality anti-malware software, malware removal will be incomplete at best. Third, choose a malware protection solution. A complete anti-malware software package includes anti-spyware software and anti-virus protection and should be fortified with a firewall. Look for these qualities when selecting an anti-malware software solution: Provides frequent version and definition updates to combat the latest threats. Consistently wins awards from industry-leading publications. Has a dedicated, round-the-clock research team devoted to keeping track of malware evolution. Is backed by an innovative company with a solid business reputation. |
|
| 35. |
How Does Malware Find Me? |
Answer»
|
|
| 36. |
Does Any Combination Of Software And Hardware Provide Complete Security? |
|
Answer» No. Someone somewhere is always creating a new virus, worm, trojan HORSE, spyware, or another new way to break through a firewall. You should use products that are updated on a regular basis by their vendors for protection from "KNOWN" attacks. Most Internet users can ACHIEVE a reasonable LEVEL of security with modest effort at low COST. No. Someone somewhere is always creating a new virus, worm, trojan horse, spyware, or another new way to break through a firewall. You should use products that are updated on a regular basis by their vendors for protection from "known" attacks. Most Internet users can achieve a reasonable level of security with modest effort at low cost. |
|
| 37. |
What Does A Router (hardware) Do? |
|
Answer» It sits between your modem and your computer or your NETWORK. It is hard to HACK your computer or a network when it is hidden BEHIND a hardware box. It sits between your modem and your computer or your network. It is hard to hack your computer or a network when it is hidden behind a hardware box. |
|
| 38. |
Is The Windows Xp Firewall Enough? |
|
Answer» It is simple and EFFECTIVE protection from INBOUND TRAFFIC. To control outbound traffic and for other FEATURES, consider one of the products on our firewalls page. It is simple and effective protection from inbound traffic. To control outbound traffic and for other features, consider one of the products on our firewalls page. |
|
| 39. |
How Serious Is The Malware Threat? |
|
Answer» The facts speak for themselves:
The facts speak for themselves:
|
|
| 40. |
What Is Malware? |
|
Answer» Malware is software designed to infiltrate or DAMAGE a COMPUTER system without the OWNER's informed CONSENT. Also KNOWN as malicious software. Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. Also known as malicious software. |
|