Lesson 8C Troubleshoot Workstation Security Issue Flashcards

1
Q

Malware Vectors

A

The vector is the method by which the malware executes on a computer and potentially spreads to other network hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Viruses

A

Malicious code inserted into an executable file image. The malicious code is executed when the file is run and can deliver a payload, such as attempting to infect other files.
.EXE, .MSI, .DLL, .COM, .SCR, and .JAR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Boot Sector Virus

A

These infect the boot sector code or partition table on a disk drive. When the disk is attached to a computer, the virus attempts to hijack the bootloader process to load itself into memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojans

A

Malicious software program hidden within an innocuous-seeming piece of software. Usually, the Trojan is used to try to compromise the security of the target computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Worms

A

Type of malware that replicates between processes in system memory and can spread over client/server network connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fileless Malware

A

Exploit techniques that use the host’s scripting environment to create malicious processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malware Payload

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Backdoors

A

Also referred to as a Remote Access Trojan, allows a threat actor to access and control the infected host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Command and Control

A

Infrastructure of hosts and services with which attackers direct, distribute, and control malware over botnets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spyware

A

Can perform browsing reconfiguration, such as allowing tracking cookies, changing default search providers, opening arbitrary pages at startup, adding bookmarks and so on. Take screenshots, activate recording devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Keylogger

A

Records a user keystrokes in order to attempt to steal sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Rootkit

A

Class of malware that modifies system files, often at the kernel level, to conceal its presence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ransomware

A

Malware that tries to extort money from the victim by blocking normal operation of a computer and/or encrypting the victim’s files and demanding payment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cryptomining

A

hijacks the resources of the host to perform cryptocurrency mining.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Troubleshoot Desktop Symptoms

A

Any type of activity or configuration change that was not initiated by the user is a good reason to raise suspicion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Performance Issues

A

Computer is slow or behaving “oddly”.
-The computer fails to boot or locks up.
-Performance at startup or in general is slow.
-Host is unable to access the internet or network performance could be slow.

17
Q

Remediation for Performance Issues

A

Run an Antivirus Scan
Quarantine the System from the network..

18
Q

Application Crashes and Service Problems

A

Apps like anti-virus and Windows Update are frequently failing. Tools like Task Manager are currently failing.

19
Q

Remediation for Crashes and Service Problems

A

Monitoring and Quarantining if apps are consistently failing to startup.

20
Q

File System Errors and Anomalies

A

Changing system files and/or permissions are altered.
-Missing or renamed files
-Additional executable files with names resembling services but are not the actual service.

21
Q

Remediation for File System Errors and Anomalies

A

Quarantine the System and Investigate closely.

22
Q

Desktop Alerts and Notifications

A

A way for pop-ups to intimidate a user into clicking in order for malware to try and elevate privileges.

23
Q

Rogue Antivirus

A

Spoofed desktop notifications and browser ads designed to alarm users and promote installation of Trojan malware.

24
Q

Troubleshoot Browser Symptoms

A
25
Q

Redirection

A

A user attempts to open a page but is sent to another page. Could lead to a drive-by download or cause credentials to be stolen.

26
Q

Certificate Warning

A

A certification that is untrusted has a warning sign rather than a padlock signifying that the website is not safe.

27
Q

Reasons for Certificate Warning

A

The certificate is self-signed or signed by an untrusted CA.
The FQDN requested by the browser is different from the subject name listed in the certificate.
The certificate has expired or is listed as revoked.

28
Q

Best Practices for Malware Removal

A
  1. Investigate and verify malware symptoms.
  2. Quarantine infected systems.
  3. Disable System Restore in Windows.
  4. Remediate infected systems:
    -Update anti-malware software.
    -Scanning and removal techniques (e.g., safe
    mode, preinstallation environment).
  5. Schedule scans and run updates.
  6. Enable System Restore and create a restore point in Windows.
  7. Educate the end user.
29
Q

Infected Systems Quarantine

A

After identifying the Malware Symptoms:
The next step is to Quarantine the System and disable System Restore.
Quarantine means that it is unable to communicate through the main network.
Move the system to a more secure segment or sandbox.

30
Q

Disable System Restore

A

Disabling System Restore and other automated backup systems, such as file history.
Delete old backups due to the likelihood of the backups being infected

31
Q

Malware Removal Tools and Methods

A

The main tool to try and remediate an infected system will be antivirus system.