3.2 and 3.3 Troubleshooting Workstation Security Flashcards

1
Q

List the seven steps, in order, of the malware removal process

A
  1. Identify and research malware symptoms
  2. Quarantine the infected systems
  3. Disable System Restore (if Windows OS)
  4. Remediate the infected system
  5. Schedule scans and run updates
  6. Enable System Restore and create a restore point (Windows
  7. Educate the end-user
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which two steps of the malware removal process are specific to Windows machines?

A

Step 3 (Disable System Restore) and Step 6 (Enable System Restore and create a restore point)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is step 4 of the malware removal process?

A

Remediate the infected system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Quarantining the infected system should be done after what?

A

Identifying and researching malware symptoms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a PUA?

A

Potentially Unwanted Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What might you use Nmap to find?

A
  • Which devices are running on the network
  • Open ports and services
  • Vulnerabilites
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does netcat allow users to do?

A

Read from and write to network connections using TCP or UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How would you quarantine an infected system?

A

By moving it into a logically or physically isolated secure segment of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some different methods that could be used to logically isolate an infected system?

A

VLANs, access controls, encryption, partitioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What sort of environment should be created to scan and test an infected computer?

A

A sandbox environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Disabling System Restore does what?

A

Turns off automated backup systems, such as cloud and external disk backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the ultimate effect of disabling System Restore?

A

The computer is prevented from returning to a previous state if the OS happens to become unstable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why might System Restore be disabled?

A

Because it prevents a computer from returning to a previous state, it also prevents the re-infection of said computer with malware that may have been present at the created restoration point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Give the two main parts of remediating infected systems

A
  • Updating anti-malware software
  • Implementing scanning and removal techniques
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List the four steps involved in scanning and removal

A
  1. Reboot in safe mode, run scanning/removal tools
  2. Turn off necessary services/background tasks by running task manager, regedit, msconfig
  3. Boot PC using Windows recovery/installation disk
  4. Re-image/re-install system from good backup/installation disk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How often should scans be scheduled?

A

At least daily

17
Q

How does scanning on-access work?

A

Local and network files are scanned when they are accessed to check for any new malware threats that may be trying to enter the system

18
Q

What is defined as ‘access’ for scanning on-access?

A

Opening, moving, copying or executing a file

19
Q

In step 6 of the malware removal process, how should you go about re-enabling System Restore?

A
  • Ensure the device is free of all malware
  • Re-enable system restore
  • Create new restore point after malware removal
  • Turn on automated backups again and validate critical services
20
Q

Give five possible symptoms that would indicate a browser is infected

A
  • Browser redirection
  • Certificate warnings
  • Wrong address
  • Automatic redirection
  • Host file infection
21
Q

What is a host file?

A

A text file that maps domain names to IP addresses and is used by the PC to resolve DNS queries

22
Q

Explain further how host file infection works

A
  • Malware targets the PC’s host file to hijack its internet connectivity
  • It changes the host file to redirect users to malicious websites
  • It can also block detection by security software or stop users from visiting other sites
23
Q

How would you clean up a host file infection?

A
  • Scan the system, uninstall and reinstall the browser
  • Check proxy settings and verify no proxy is being used
24
Q

Define ‘dropper’.

A

A trojan horse that has been designed to deliver malware to a device, often packaged to evade detection by anti-malware software

25
Q

Define ‘payload’.

A

The malicious code delivered by the dropper, which is converted into executable form if necessary and then executed on the system

26
Q

What is a rogue antivirus?

A

A malicious software that tricks users into believing there is a virus on their computer and that they need to download (and sometimes pay for) a fake malware removal tool, which is actually the malware itself

27
Q

List 4 things that a rogue antivirus might do.

A
  • Alter the system’s security settings
  • Block access to Task Manager or Registry Editor
  • Disable Windows Firewall
  • Kill processes associated with AV solutions
28
Q

How might you remove rogue antivirus?

A
  • Go to the Program Files window
  • Find the rogue software program folder
  • Delete folder
29
Q

How can you check if malware is causing OS updates to fail?

A

Turn off the update service and run the system file checker to see if there is malware affecting it