9.2.9 Practice Questions Flashcards
Daphne has determined that she has malware on her Linux machine. She prefers to only use open-source software. Which anti-malware software should she use?
answer
Kaspersky
Bitdefender
ClamAV
Avira
ClamAV
Listen to exam instructions
Anti-malware software utilizes different methods to detect malware. One of these methods is scanning. Which of the following best describes scanning?
answer
Scanning establishes a baseline and keeps an eye on any system changes that shouldn’t happen. The program will alert the user that there is possible malware on the system.
Scanning uses live system monitoring to detect malware immediately. This technique utilizes a database that needs to be updated regularly. Scanning is the quickest way to catch malware programs.
Scanning aids in detecting new or unknown malware that is based on another known malware. Every malware has a fingerprint, or signature. If a piece of code contains similar code, the scan should mark it as malware and alert the user.
Scanning is when the anti-malware software opens a virtual environment to mimic CPU and RAM activity. Malware code is executed in this environment instead of the physical processor.
Scanning uses live system monitoring to detect malware immediately. This technique utilizes a database that needs to be updated regularly. Scanning is the quickest way to catch malware programs.
Listen to exam instructions
Which of the following is the first step you should take if malware is found on a system?
answer
Sanitize the system using updated anti-malware software.
Look through the event log for suspicious events.
Check for suspicious or unknown registry entries.
Isolate the system from the network immediately.
Isolate the system from the network immediately.
Daphne suspects a Trojan horse is installed on her system. She wants to check all active network connections to see which programs are making connections and the FQDN of where those programs are connecting to. Which command will allow her to do this?
answer
netstat -a -b
netstat -f -a
netstat -f -a -b
netstat -f -b
netstat -f -b
Part of a penetration test is checking for malware vulnerabilities. During this process, the penetration tester will need to manually check many different areas of the system. After these checks have been completed, which of the following is the next step?
answer
Sanitize the system
Isolate system from network
Document all findings
Run anti-malware scans
Run anti-malware scans