Security: detect, remove, and prevent malware using the appropriate tools and methods. Flashcards

CompTIA A+ 220-1102 Exam Criteria

1
Q

What Type of Malware is a: Trojan?

A

Unsolicited software/image/png (benign) etc that gets downloaded - runs a payload that has malware.

The effects of Trojans can be highly dangerous. Like viruses, they can destroy files or information on hard disks. They can also capture and resend confidential data to an external address or open communication ports, allowing an intruder to control the infected computer remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What Type of Malware is a: Rootkit?

A

Came from unix/linux - essentially do what they want (administrator) and they can install themselves in a boot loader outside of the OS before your malware software can kick on and defend you.

Windows has ELAM – Early Launch Anti Malware solution – that actually test the system driver before the operating system even boots.

A lot of times to remediate these systems that have root kits, you have to use live CDs in a pre-installation environment by something like Windows defender offline where you actually load the software into memory before the hard drive even spins up. And it’s smart enough to look into the file directory and search the locations where these pieces of malware and the root kits actually sit. So they’re very nasty. They’re very hard to get off of your systems because like a privileged administrator, they can intercept calls and hook them any way they want and the anti malware software might not even be aware that they’re there. So very, very hard things to detect and sometimes even harder to get off of your systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What Type of Malware is a: Virus and worms?

A

Needs some kind of host file / executable. Unauthorized piece of code for a virus.

Worms does not need a host. Self sufficient and self replicate. Can stay silent and consume resources unlike a virus itself propagating. Only needs a port of entry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What Type of Malware is a: Spyware/Adware?

A

Spyware is any software with malicious behavior that aims to gather information about a person or organization and send it to another entity in a way that harms the user by violating their privacy, endangering their device’s security, or other means. This behavior may be present in malware and in legitimate software.

Follow your browsing habits and trick you into buying something with ads

Spyware – monitoring your activity and report to a third party entity.

Scareware – software that is unwanted programs – downloads automatically on a website, presenting a sense of urgency to trick you into paying money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What Type of Malware is a: Ransomware?

A

Piece of software that encrypts the entire system.

Can search for backups to encrypt it. (back up your data anyway)

Used for black mailing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What Type of Malware is a: Keylogger?

A

No need for social engineering or password attacks – can monitor key strokes.

Accessed by third party and relayed information.

Can be a physical hardware eg USB port – physically plugging into port and capturing key strokes

Can be used in software (downloaded malware)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What Type of Malware is a: Boot Sector virus?

A

Bootkits are very similar to rootkits, but instead of infecting the kernel, they go for the Master Boot Record (MBR) or the Volume Boot Record (VBR). MBRs and VBRs are records stored in your computer’s disk that help to start (or ‘boot’) your operating system from the hard drive when you first turn on your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What Type of Malware is a: Cryptominers?

A

Cryptojacking (also called malicious cryptomining) is an online threat that hides on a computer or mobile device and uses the machine’s resources to “mine” forms of online currency known as cryptocurrencies. Malicious cryptominers often come through web browser downloads or rogue mobile app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can we scan for virus using windows OS?

A

In Settings window > Update and Security > Windows Security

From the Settings - Windows Security pane, select Virus & threat protection.

In the Windows Security - Virus & threat protection pane, select Manage settings under Virus & threat protection settings.

In the Windows Security - Virus & threat protection settings pane, scroll down and select Add or remove exclusions under the Exclusions section.

In the Windows Security - Exclusions pane, select C:\ and choose Remove.

Select Virus & threat protection on the left pane.

In the Windows Security - Virus & threat protection pane, select Scan options under Current threats. > select the Custom scan option. > Scroll down and select scan now.

In the Select Folder dialog box, choose Desktop on the left pane.

Click Select Folder. > Observe the malware threat notifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to Analyze Malware Attributes?

A

In Settings window > Update and Security > Windows Security> Select Virus & threat protection on the left pane.

In the Windows Security - Virus & threat protection pane, under Current threats, select Virus:DOS/EICAR_Test_File.

Select See details from the drop-down menu.

On the Virus:DOS/EICAR_Test_File window, review the following malware attributes:

Alert level

Status

Date

Category

Details

Affected items

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How to Remove of Malware and Infected systems?

A

In Settings window > Update and Security > Windows Security> Select Virus & threat protection on the left pane.

Windows Security - Virus & threat protection window is open.

If necessary, select the Virus:DOS/EICAR_Test_File.

Click Remove.

Select Start actions.

The Taking action on threats message appears.

The Virus:DOS/EICAR_Test_File is now removed.

Close the Windows Security - Virus & threat protection window.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can you utilize system restore after removal process of Malware?

A

Windows System Restore allows users to create point-in-time configuration snapshots that can be used to return a Windows machine to an early configuration. The goal is to create a restore before remediation, and if one is not created ahead of time, then one should be created after malware removal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can you enable system Restore?

A

Start> Settings - About> Advance System setting (under related settings sections)

In the System Properties window, select the System Protection tab.

In the System Properties - System Protection tab, select Configure.

In the System Protection for Local Disk (C:) window, select the Turn on system protection option under the Restore Settings section. > Click OK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can you create a System Restore Point?

A

From the System Protection tab, select Local Disk (C:) (System) under Protection Settings.

Click Create. > In the Create a restore point input box, type:

Initial remediation point > Click Create

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can you verify that System restore point is created?

A

System Properties window is open.

Select System Restore…

In the System Restore - Restore system files and settings page, click Next.

In the System Restore - Restore your computer to the state it was in before the selected event page, notice that the previously created Initial remediation point is present. > Click Cancel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can you get into recovery Mode?

A

On shutdown you can hold the shift key while shutting down and this will put you in windowsRE (windows RE)

17
Q

What Options do you have on Recovery Mode?

A

Start up Repair - fixes problems that prevent Windows from loading

Start up Settings - Configure what applications can start up or boot into safe mode.

Uninstall Updates - You can remove recently install updates or feature updates from windows.

UEFI Firmware Settings - Change settings from your UEFI firmware

System Restore - Use a restore point recorded in your PC to restore windows.

18
Q

How can I implement Anti-malware?

A

You can use third party websites. They are also Edge and Google Anti-Malware systems in place to use against malware.

19
Q

What does soft-ware firewalls do?

A

They can filter through which applications can go through the router to gain access to and from the internet.

20
Q

Anti-phishing methods?

A

to teach employees how to recognize and avoid malicious attempts from hackers. It is important for any organization, as it helps protect against data breaches, compromised login credentials, and other cyber-attacks.

21
Q

How can you reinstall the OS to clear and wipe unwanted threats?

A

Use a boot any boot installation method> At Windows Set up> Repair Computer option> In Choose an option: Trouble Shoot> Reset PC to factory setting > options to keep your settings and files.

you can also use system restore