Module quiz: Threats and attacks :Cybersecurity Threat Vectors and Mitigation (Microsoft Cybersecurity Analyst Professional Certificate) Answers 2025
1. You should always take full backups for better recovery.
❌ True
✅ False
Explanation:
Incremental + differential backups + periodic full backups = best strategy. Full backups every time are unnecessary and inefficient.
2. Benefits of full disk encryption (Select all)
❌ Prevents ransomware attacks
❌ Makes computer faster
✅ Prevents unauthorized access to storage
✅ Prevents data theft even if the device is stolen
3. Methods antimalware uses to detect malware (Select all)
✅ Sandbox analysis
✅ Heuristic analysis
✅ Behavioral analysis
❌ Attachment filename
4. Email tricked you into changing password → can’t log in next day. True statements:
❌ Victim of spam
✅ Victim of social engineering
❌ Victim of malware
✅ Victim of phishing attack
5. Attack targeting high-profile executives (Select all)
❌ Baiting
✅ Whaling
❌ Spear phishing (targets individuals but not specifically executives)
❌ Cold calling
6. Role of command-and-control center in malware
❌ Remove malware
❌ Monitor traffic
✅ Coordinate and control infected systems
❌ Encrypt/decrypt info
7. Meltdown & Spectre vulnerabilities — true statements:
❌ Affect only Intel processors
✅ Exploit hardware vulnerabilities in CPUs
❌ Affect only mobile devices
❌ Can only be exploited through software (hardware flaw triggered via software)
8. Used to distribute other vulnerabilities in an infected system
⬆️ This describes an:
✅ Exploit kit
❌ Botnet
❌ Rootkit
❌ Trojan
9. Worms spread by exploiting OS or software vulnerabilities
✅ True
❌ False
10. Main difference between virus and trojan
❌ Only email transmission
❌ Virus easy to detect, trojan hard
✅ Virus self-replicates; trojan does not
❌ Viruses always more harmful
🧾 SUMMARY TABLE
| Q# | Correct Answer |
|---|---|
| 1 | False |
| 2 | Unauthorized access prevention, Device theft protection |
| 3 | Sandbox, Heuristic, Behavioral |
| 4 | Social engineering, Phishing |
| 5 | Whaling |
| 6 | Control infected systems |
| 7 | Hardware vulnerability exploitation |
| 8 | Exploit kit |
| 9 | True |
| 10 | Virus replicates; trojan does not |