Exam Compass - Malware Removal Procedures Quiz Flashcards
One of the best practices for malware removal involves the process of isolation of files and applications suspected of containing malware to prevent further execution and potential harm to the user’s system. This process is referred to as:
Quarantine
Content filtering
Protected mode
Malware signature update
Quarantine
Which of the following should be the first step of the malware-removal procedure?
Updating anti-malware software
Disabling System Restore in Windows
Investigating and verifying malware symptoms
Enabling System Restore and creating a restore point in Windows
Investigating and verifying malware symptoms
According to the CompTIA’s best practice procedures for malware removal, putting a malware-infected Windows-based system into a quarantine should be the next step after:
Creating a restore point
Investigating and verifying malware symptoms
Disabling System Restore
Updating the anti-malware software
Investigating and verifying malware symptoms
According to the CompTIA’s best practice procedures for malware removal, disabling System Restore on a malware-infected Windows-based system should be performed as the next step after:
Isolating the infected system
Removing malware from the infected system
Investigating and verifying malware symptoms
Scheduling scans and running updates
Isolating the infected system
Which of the following steps in Windows 10 provides access to an interface used for configuring restore settings, managing disk space, and deleting restore points?
Control Panel (icon view) > Recovery > Configure System Restore > Configure…
Control Panel (icon view) > Security and Maintenance > Recovery > Configure System Restore > Configure…
Control Panel (category view) > System and Security > Security and Maintenance > Recovery > Configure System Restore > Configure…
Control Panel (category view) > System and Security > Review your computer’s status and resolve issues (under Security and Maintenance) > Recovery > Configure System Restore > Configure…
Windows Run dialog box > type in: sysdm.cpl + press Enter > System Protection > Configure…
Windows Run dialog box > type in: wscui.cpl + press Enter > Recovery > Configure System Restore > Configure…
Any of the above
Any of the above
According to the CompTIA’s best practice procedures for malware removal, removing malicious software on a Windows-based system should be performed as the next step after:
Disabling System Restore
Isolating the infected system
Scheduling scans and running updates
Creating a restore point
Disabling System Restore
An anti-malware database entry used for identifying malicious code is referred to as malware:
ID
Record
Signature
Repository
Signature
An anti-malware software is kept up to date via: (Select 2 answers)
Driver updates
Application updates
Engine updates
OS updates
Signature updates
Engine updates
Signature updates
The actual process of malware removal should be preceded by the application of anti-malware software updates.
True
False
True
Which of the answers listed below refer to boot environments used for malware scanning and removal in MS Windows? (Select 2 answers)
Safe Mode
Clean boot
Safe Boot
WinPE
Standby mode
Safe Mode
WinPE
According to the CompTIA’s best practice procedures for malware removal, scheduling scans and running updates on a Windows-based system should be performed as the next step after:
Enabling System Restore
Isolating the infected system
Removing malware from the system
Creating a restore point
Removing malware from the system
According to the CompTIA’s best practice procedures for malware removal, enabling System Restore and creating a restore point in Windows should be performed as the next step after:
Removing malware from the system
Scheduling scans and running updates
Identifying and researching malware symptoms
Isolating the infected system
Scheduling scans and running updates
According to the CompTIA’s best practice procedures for malware removal, user education should be the last step of the malware removal process.
True
False
True