Exam Compass - Malware Removal Procedures Quiz Flashcards

1
Q

One of the best practices for malware removal involves the process of isolation of files and applications suspected of containing malware to prevent further execution and potential harm to the user’s system. This process is referred to as:
Quarantine
Content filtering
Protected mode
Malware signature update

A

Quarantine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following should be the first step of the malware-removal procedure?
Updating anti-malware software
Disabling System Restore in Windows
Investigating and verifying malware symptoms
Enabling System Restore and creating a restore point in Windows

A

Investigating and verifying malware symptoms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

According to the CompTIA’s best practice procedures for malware removal, putting a malware-infected Windows-based system into a quarantine should be the next step after:
Creating a restore point
Investigating and verifying malware symptoms
Disabling System Restore
Updating the anti-malware software

A

Investigating and verifying malware symptoms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

According to the CompTIA’s best practice procedures for malware removal, disabling System Restore on a malware-infected Windows-based system should be performed as the next step after:
Isolating the infected system
Removing malware from the infected system
Investigating and verifying malware symptoms
Scheduling scans and running updates

A

Isolating the infected system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following steps in Windows 10 provides access to an interface used for configuring restore settings, managing disk space, and deleting restore points?
Control Panel (icon view) > Recovery > Configure System Restore > Configure…
Control Panel (icon view) > Security and Maintenance > Recovery > Configure System Restore > Configure…
Control Panel (category view) > System and Security > Security and Maintenance > Recovery > Configure System Restore > Configure…
Control Panel (category view) > System and Security > Review your computer’s status and resolve issues (under Security and Maintenance) > Recovery > Configure System Restore > Configure…
Windows Run dialog box > type in: sysdm.cpl + press Enter > System Protection > Configure…
Windows Run dialog box > type in: wscui.cpl + press Enter > Recovery > Configure System Restore > Configure…
Any of the above

A

Any of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

According to the CompTIA’s best practice procedures for malware removal, removing malicious software on a Windows-based system should be performed as the next step after:
Disabling System Restore
Isolating the infected system
Scheduling scans and running updates
Creating a restore point

A

Disabling System Restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An anti-malware database entry used for identifying malicious code is referred to as malware:
ID
Record
Signature
Repository

A

Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An anti-malware software is kept up to date via: (Select 2 answers)
Driver updates
Application updates
Engine updates
OS updates
Signature updates

A

Engine updates
Signature updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The actual process of malware removal should be preceded by the application of anti-malware software updates.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the answers listed below refer to boot environments used for malware scanning and removal in MS Windows? (Select 2 answers)
Safe Mode
Clean boot
Safe Boot
WinPE
Standby mode

A

Safe Mode
WinPE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

According to the CompTIA’s best practice procedures for malware removal, scheduling scans and running updates on a Windows-based system should be performed as the next step after:
Enabling System Restore
Isolating the infected system
Removing malware from the system
Creating a restore point

A

Removing malware from the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

According to the CompTIA’s best practice procedures for malware removal, enabling System Restore and creating a restore point in Windows should be performed as the next step after:
Removing malware from the system
Scheduling scans and running updates
Identifying and researching malware symptoms
Isolating the infected system

A

Scheduling scans and running updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

According to the CompTIA’s best practice procedures for malware removal, user education should be the last step of the malware removal process.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly