Chapter 29 securing endpoint systems Flashcards

(10 cards)

1
Q

Which term does not describe how malware spreads to new systems?

Virus

Worm

Key logger

Trojan

A

The term key logger describes malware that records everything the user types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In CompTIA’s 7-step malware management process, which step immediately follows step 3 (disable System Restore)?

Quarantie Infected Systems

Remediate Infected Systems

Schedule scans and run updates

Educate Users

A

Step 4 of the 7-step system is to remediate infected systems. step 2 is to quarantine infected systems. Step 5 is to schedule scans and run updates. Step 7 is to educate users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which is not a social engineering attack?

Phishing

Tailgating

Trojan

Shoulder Surfing

A

A Trojan is a malware distribution technique, not a social engineering attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CompTIA’s 7-step malware management process: Step 1

A

Identify Malware Symptoms.

The first step involves detecting unusual system behavior that may indicate malware infection. Common symptoms include slow system performance, unexpected pop-up ads, unusual network activity, or unauthorized access attempts. IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CompTIA’s 7-step malware management process: Step 2

A

Quarantine Infected Systems.

Once malware is suspected, the infected system should be isolated from the network to prevent the malware from spreading. Quarantining can involve disconnecting the system from the internet, disabling network connections, or using specialized containment tools. This step is crucial to limit damage and protect other devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CompTIA’s 7-step malware management process: Step 3

A

Disable System Restore.

On Windows systems, System Restore can inadvertently preserve malware, allowing reinfection. To prevent this, access the System Properties, select the drive, and turn off system protection. Disabling System Restore ensures that malware cannot reappear from previously saved restore points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CompTIA’s 7-step malware management process: Step 4

A

Remediate Infected Systems.

Remediation involves removing the malware using updated antivirus and anti-malware tools. This may include running full system scans, manually deleting malicious files, or using specialized removal utilities. Ensuring that software definitions are current is critical for effective detection and removal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CompTIA’s 7-step malware management process: Step 5

A

Schedule Scans and Updates

After remediation, it is important to schedule regular system scans and software updates. This step helps maintain ongoing protection by keeping antivirus definitions current and detecting any residual or new malware threats early.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CompTIA’s 7-step malware management process: Step 6

A

Re-enable System Restore and Create Restore Points

Once the system is clean, re-enable System Restore and create a new restore point. This ensures that future system recovery points are free from malware and can be safely used if needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CompTIA’s 7-step malware management process: Step 7

A

Educate the User

The final step focuses on user education to prevent future infections. Users should be trained on safe browsing habits, recognizing phishing attempts, avoiding suspicious downloads, and maintaining updated security software. Educated users are a critical line of defense against malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly