Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:
Malware
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:
Ransomware
Which of the following terms refers to an example of crypto-malware?
Ransomware
A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as:
A Trojan horse
What is an example of spyware?
Keylogger
A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
Rootkit
Definitions of a computer virus: [3]
A malware-infected networked host under remote control of a hacker is commonly referred to as a:
Botnet
What is the name of a standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth?
Worm
Malicious software collecting information about users without their knowledge/consent is known as:
Spyware
What enables troubleshooting a malware-infected system that doesn’t boot up?
Recovery Console
What can be used to launch Windows Recovery Environment (WinRE) in Windows 8/8.1/10? [4]
What is the most reliable method for effectice malware removal?
Restoring the entire system from a known good backup copy
What would be the best malware-prevention method/tool?
End user education
Unified Threat Management (UTM):
What can be used by system administrators to selectively block access to known malware sites?
DNS configuration
According to the CompTIA’s best practice procedures for malware removal, putting a malware-infected Windows-based system into a quarantine should be the next step after:
Identifying and researching malware symptoms
According to the CompTIA’s best practice procedures for malware removal, disabling System Restore on a malware-infected Windows-based system should be performed as the next step after:
Isolating the infected system
Which of the following locations in MS Windows provide access to an interface containing options for configuring restore settings, managing disk space, and deleting restore points? [2]
According to the CompTIA’s best practice procedures for malware removal, removing malicious software on a Windows-based system should be performed as the next step after:
Disabling System Restore
According to the CompTIA’s best practice procedures for malware removal, scheduling scans and running updates on a Windows-based system should be performed as the next step after:
Removing malware from the system
According to the CompTIA’s best practice procedures for malware removal, enabling System Restore and creating a restore point in Windows should be performed as the next step after:
Scheduling scans and running updates
According to the CompTIA’s best practice procedures for malware removal, what should be the final step of the malware removal process?
User education