The contents of encrypted files can be inspected for malware by an anti-virus program.
Password protection is used to make sure that files are available to users inside an organization.
What types of threats can an anti-virus program detect? (Choose all that apply)
|Macro viruses attached to a Microsoft Word document.|
|Downloads (files or Web pages) from Web sites that contain malware.|
|Malware infected email attachments.|
|Worms that infect operating system files.|
|Keyloggers installed in keyboard firmware.|
|Malware infected USB hubs|
AVG 2012 must be started manually by the user. It cannot be run at system startup.
The AVG VIrus Vault contains which of the following?
|Hash values for known viruses.|
|“Cleaned” files after viruses were removed by AVG|
|Virus definition files.|
At what point did AVG detect a virus in the ZIP archive prodrev.zip:
|After the infected file was extracted.|
|When the user tried to open the file productreview.pdf.|
|During the full system scan.|
|The zip archive prodev.zip did not contain any virus infected files.|
Tracking cookies are a threat to which of the following?
The default scan for AVG is a sector by sector scan of the physical disk.
Helix is a suite of software programs that are useful to computer forensics examiners. Why did AVG quarantine some of the files belonging to Helix? (Choose all that apply)
|The contents of one or more Helix files matched a virus signature in AVG’s database.|
|Helix looked like spyware to AVG.|
|AVG always quarantines encrypted executable files.|
|The contents of one or more Helix files matched a Trojan Horse signature in AVG’s database.|
|Computer forensics tools should not be on the student virtual workstation.|