SK_deck_4701546 Flashcards
List the 4 step computer path to access Windows Defender in Windows XP. pg .968
Choose Start, Control Panel, Security, Software Explorers
Name a subset of Malware. pg. 968
spyware
How does spyware differ from malware? pg. 968
spyware works on behalf of a third party - rather than replicating like viruses it spreads to machines by users who inadvertently ask for it
What two programs did Microsoft release to combat spyware? pg. 968
Microsoft Security Essentials and Windows Defender
What Microsoft community can you join to help with isolating and reducing spyware? pg. 969
SpyNet
How can you access SpyNet? pg. 969
via Windows Defender, click Tools voila! Microsoft SpyNet
There are times when bad things happen to good ___.
people AND computers
What feature was introduced with Windows XP to make recovery of the operating system easier through restore points? pg. 970
System Restore
What is like a backup of your configuration but not necessarily your data? pg. 970
restore point is a copy of your system configuration at a given point in time
Name the 3 ways a restore point can be created. pg. 970
- Windows creates them automatically 2. manually created 3. during installation of some programs
List the 4 step computer path to access System Restore in Windows Vista. pg. 971
Start, All Programs, Accessories, System Tools
T/F System Restore does not affect any of your docs, pics, or other personal data, and the process is irreversible. pg. 971
False- it IS reversible
What will you find listed on the Restore Point log? pg. 971
restore points and backups that have been performed
What is the method used in Windows 7 to access System Protection? pg. 972
right-click My computer and choose Properties
What computer path do you take to create a Restore Point in Windows XP? pg. 972
Start, All Programs, Accessories, System Tools
T/F CompTIA wants you to consider a 7-item list when addressing a possible malware infestation. pg. 973
True
What’s the first thing you should do if you suspect malware? pg. 973
Identify and prove the type of malware, ie. spyware, virus, worm…
What’s the second step on the 7-item list of addressing malware infestation? pg. 973
Quarantine
What can be done to prevent the malware from creating a restore point? pg. 974
Disable System Restore
What’s involved in Step 4: Remediating the infected system? pg. 974
Updating the antivirus software and using the appropriate scan and removal techniques
What are a couple of removal techniques? pg. 974
booting into Safe Mode or a pre-installation environment
Step #5? pg. 974
schedule scans and updates
How can you configure an anti-malware program that doesn’t automatically run updates? pg. 974
Task Schedular
Once the system is working properly, it’s important to do this 6th step which is? pg. 974
enable system restore and create a restore point
And the last but not least final step is…??? pg, 974
Education provided to the end user, ie. what led to virus, what to avoid, or what to look for