Which term does not describe how malware spreads to new systems?
Virus
Worm
Key logger
Trojan
The term key logger describes malware that records everything the user types.
In CompTIA’s 7-step malware management process, which step immediately follows step 3 (disable System Restore)?
Quarantie Infected Systems
Remediate Infected Systems
Schedule scans and run updates
Educate Users
Step 4 of the 7-step system is to remediate infected systems. step 2 is to quarantine infected systems. Step 5 is to schedule scans and run updates. Step 7 is to educate users
Which is not a social engineering attack?
Phishing
Tailgating
Trojan
Shoulder Surfing
A Trojan is a malware distribution technique, not a social engineering attack.
CompTIA’s 7-step malware management process: Step 1
Identify Malware Symptoms.
The first step involves detecting unusual system behavior that may indicate malware infection. Common symptoms include slow system performance, unexpected pop-up ads, unusual network activity, or unauthorized access attempts. IT
CompTIA’s 7-step malware management process: Step 2
Quarantine Infected Systems.
Once malware is suspected, the infected system should be isolated from the network to prevent the malware from spreading. Quarantining can involve disconnecting the system from the internet, disabling network connections, or using specialized containment tools. This step is crucial to limit damage and protect other devices.
CompTIA’s 7-step malware management process: Step 3
Disable System Restore.
On Windows systems, System Restore can inadvertently preserve malware, allowing reinfection. To prevent this, access the System Properties, select the drive, and turn off system protection. Disabling System Restore ensures that malware cannot reappear from previously saved restore points.
CompTIA’s 7-step malware management process: Step 4
Remediate Infected Systems.
Remediation involves removing the malware using updated antivirus and anti-malware tools. This may include running full system scans, manually deleting malicious files, or using specialized removal utilities. Ensuring that software definitions are current is critical for effective detection and removal.
CompTIA’s 7-step malware management process: Step 5
Schedule Scans and Updates
After remediation, it is important to schedule regular system scans and software updates. This step helps maintain ongoing protection by keeping antivirus definitions current and detecting any residual or new malware threats early.
CompTIA’s 7-step malware management process: Step 6
Re-enable System Restore and Create Restore Points
Once the system is clean, re-enable System Restore and create a new restore point. This ensures that future system recovery points are free from malware and can be safely used if needed.
CompTIA’s 7-step malware management process: Step 7
Educate the User
The final step focuses on user education to prevent future infections. Users should be trained on safe browsing habits, recognizing phishing attempts, avoiding suspicious downloads, and maintaining updated security software. Educated users are a critical line of defense against malware.