In the context of digital communication, which of the following is the most appropriate measure to mitigate the risks associated with messages containing angry or antagonistic content, potentially leading to harassment or cyberbullying?
💡 Explanation
Content filtering and moderation directly address the prevention and management of harmful messages, whereas the other options relate to hardware performance or general system maintenance, not message content.
Which type of malware is characterized by its ability to overwrite existing files or replace parts of them with its own code?
💡 Explanation
File infectors are malware programs designed to attach themselves to executable files and overwrite their contents.
Which of the following is LEAST likely to be considered a security risk or a potential violation of privacy?
💡 Explanation
While spam can be annoying and sometimes contain malicious links, it is generally less of a direct security risk or privacy violation compared to phishing, malware, and unauthorized access.
Upon successful booting and initialization of the Graphical User Interface (GUI), which critical security process is typically the first to be executed to verify user identity?
💡 Explanation
Authentication is the security process responsible for verifying a user's identity before granting access to the system, which logically precedes other startup processes.
In the realm of computer security, what is the commonly used term for the act of illegally obtaining or attempting to obtain sensitive information such as user credentials or passwords?
💡 Explanation
Spoofing specifically refers to the act of disguising a communication from an unknown source as a known, trusted source, often to gain unauthorized access to passwords or other sensitive data.
Which type of malicious software is designed to replicate itself and spread to other systems without the user's explicit consent or awareness?
💡 Explanation
A virus is characterized by its ability to self-replicate and spread without user permission.