Software and Trouble Shooting: use best practice procedures for malware removal Flashcards
CompTIA A+ 220-1102 Exam Criteria
What is the first step on removing malware?
Identify and research malware symptoms.
What is the Second step on removing malware?
Quarantine the infected systems.
What is the third step on removing malware?
Disable System Restore (in Windows).
What is the two consideration you will need to know on step four of the removing process of malware?
Remediate the infected systems.
Update (or install) anti-malware software.
Scan and use removal techniques (safe mode, pre-installation environment).
What is the fifth step on removing malware?
Schedule scans and run updates.
What is the sixth step on removing malware?
Enable System Restore and create a restore point (in Windows).
What is the last step of removing malware?
Educate the end user.
What are some tips for identifying and research malware?
Identify and research malware symptoms –
www.microsoft.com/en-us/wdsi/threats
www.cve.mitre.org
What methods can you take Quarantine infected systems?
Virus is found (actions pane for notification)
Remove the system from the network (disable network adapter or unplug the network cable)
Virus is quarantined (check Protection history) > Right click windows icon> Settings> window Security > virus & threat protection > protection history
This is the default action
How can you disable system restore?
Settings > System > About > System Protection > configure > turn it off - to avoid store points and does not download the virus again
How can you remediate the infected system?
Apply the action in Window Security > remove the threats
How can you initiate scheduled scans and run updates?
Right-click Start icon > Computer Management > Task Scheduler > Task Scheduler Library > Microsoft > Windows > Windows Defender > Windows Defender Scheduled Scan
How can you enable System Restore and create a restore point?
Enable System Restore and create a restore point (Restore points)
Settings > System > About > System Protection > Configure > Turn on system protection
Settings > System > About > System Protection > Create
What do you do when you finish all the procedures for removing malware?
Turn the network back on.
What do you do once you finish and fixed the malware issues?
Educate the end user.