2.4 Flashcards
What is a rootkit?
Malware the ingrains itself with the system which in return gains the ability to modify core system files.
What is a tricky characteristic of rootkits?
They can be invisible. You won’t be able to spot it based off an executable and because of this, it can also be invisible to traditional anti-virus utilities.
What is malware that can reproduce itself with the helps of an unknowing user?
Virus.
What is malware that can reproduce itself without needing any outside influence?
Worms.
What utility can you use if a computer is infected with Malware and it becomes unable to boot?
Windows Recovery Environment
How do you access the Windows Recovery Environment?
Windows 7 - Boot from installation media or select F8
Windows 8/8.1/10 - Boot from installation media or Troubleshoot -> Advanced Options -> Command Prompt
What is the best guaranteed way to recover from an infection?
Restore from a known good backup.
Where in Windows can you go to create a backup image?
Backup and Restore
What are examples of end user education?
1-on-1 training
Posters and signs
Message board posting
Login message
Intranet page
What does having a secure dns service offer?
Allows you to monitor users and prevent them from visiting known malicious sites.