Skip to content

Module quiz: Threats and attacks :Cybersecurity Threat Vectors and Mitigation (Microsoft Cybersecurity Analyst Professional Certificate) Answers 2025

1. You should always take full backups for better recovery.

❌ True
False

Explanation:
Incremental + differential backups + periodic full backups = best strategy. Full backups every time are unnecessary and inefficient.


2. Benefits of full disk encryption (Select all)

❌ Prevents ransomware attacks
❌ Makes computer faster
Prevents unauthorized access to storage
Prevents data theft even if the device is stolen


3. Methods antimalware uses to detect malware (Select all)

Sandbox analysis
Heuristic analysis
Behavioral analysis
❌ Attachment filename


4. Email tricked you into changing password → can’t log in next day. True statements:

❌ Victim of spam
Victim of social engineering
❌ Victim of malware
Victim of phishing attack


5. Attack targeting high-profile executives (Select all)

❌ Baiting
Whaling
❌ Spear phishing (targets individuals but not specifically executives)
❌ Cold calling


6. Role of command-and-control center in malware

❌ Remove malware
❌ Monitor traffic
Coordinate and control infected systems
❌ Encrypt/decrypt info


7. Meltdown & Spectre vulnerabilities — true statements:

❌ Affect only Intel processors
Exploit hardware vulnerabilities in CPUs
❌ Affect only mobile devices
❌ Can only be exploited through software (hardware flaw triggered via software)


8. Used to distribute other vulnerabilities in an infected system

⬆️ This describes an:
Exploit kit
❌ Botnet
❌ Rootkit
❌ Trojan


9. Worms spread by exploiting OS or software vulnerabilities

True
❌ False


10. Main difference between virus and trojan

❌ Only email transmission
❌ Virus easy to detect, trojan hard
Virus self-replicates; trojan does not
❌ Viruses always more harmful


🧾 SUMMARY TABLE

Q# Correct Answer
1 False
2 Unauthorized access prevention, Device theft protection
3 Sandbox, Heuristic, Behavioral
4 Social engineering, Phishing
5 Whaling
6 Control infected systems
7 Hardware vulnerability exploitation
8 Exploit kit
9 True
10 Virus replicates; trojan does not