Malware Flashcards

1
Q

Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following terms refers to an example of crypto-malware?

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as:

A

A Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an example of spyware?

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Definitions of a computer virus: [3]

A
  • A self-replicating computer program containing malicious segment
  • Requires its host application to be run to make the virus active
  • Attaches itself to an application program or other executable component
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A malware-infected networked host under remote control of a hacker is commonly referred to as a:

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the name of a standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth?

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malicious software collecting information about users without their knowledge/consent is known as:

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What enables troubleshooting a malware-infected system that doesn’t boot up?

A

Recovery Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can be used to launch Windows Recovery Environment (WinRE) in Windows 8/8.1/10? [4]

A
  • Boot from installation media
  • In Power menu, hold down the Shift key and select Restart
  • Boot from Recovery Drive
  • Perform system restart from the Settings menu
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the most reliable method for effectice malware removal?

A

Restoring the entire system from a known good backup copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What would be the best malware-prevention method/tool?

A

End user education

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Unified Threat Management (UTM):

A
  • A network security solution, commonly in the form of a dedicated device
  • Functionality of a firewall with additional safeguards such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS functionality, or malware inspection.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What can be used by system administrators to selectively block access to known malware sites?

A

DNS configuration

17
Q

According to the CompTIA’s best practice procedures for malware removal, putting a malware-infected Windows-based system into a quarantine should be the next step after:

A

Identifying and researching malware symptoms

18
Q

According to the CompTIA’s best practice procedures for malware removal, disabling System Restore on a malware-infected Windows-based system should be performed as the next step after:

A

Isolating the infected system

19
Q

Which of the following locations in MS Windows provide access to an interface containing options for configuring restore settings, managing disk space, and deleting restore points? [2]

A
  • Windows Run dialog box -> type in sysdm.cpl + press Enter -> System Protection -> Configure
  • Control Panel (Icon view) -> Recovery -> Configure System Restore -> Configure
20
Q

According to the CompTIA’s best practice procedures for malware removal, removing malicious software on a Windows-based system should be performed as the next step after:

A

Disabling System Restore

21
Q

According to the CompTIA’s best practice procedures for malware removal, scheduling scans and running updates on a Windows-based system should be performed as the next step after:

A

Removing malware from the system

22
Q

According to the CompTIA’s best practice procedures for malware removal, enabling System Restore and creating a restore point in Windows should be performed as the next step after:

A

Scheduling scans and running updates

23
Q

According to the CompTIA’s best practice procedures for malware removal, what should be the final step of the malware removal process?

A

User education