Software Troubleshooting: Given a scenario, troubleshoot common PC security issues with appropriate tools and best practices Flashcards
What software found in Vista helps to prevent malware and spyware infections?
Windows Defender
After identifying a user’s computer has malware, what should your next step be?
Quarantine the computer
You are attempting to uninstall a suspicious application, but the uninstall fails. How do you remove it in the easiest way possible?
System Restore to a state before the application was installed
What is the most common way a computer gets infected in an office?
Opening an email attachment
Always scan attachments before opening them
What tool would allow you to see if any Trojan horses are being loaded at startup?
MSCONFIG
What is the recommended setting for UAC for the highest level of security?
Prompt for credentials on the secure desktop
A newly installed application can not access a network server. What should you check first?
Firewall settings
What type of attack attempts to redirect you to a fake website?
Hyperlink/web spoofing
According to Comp TIA, what are the 6 steps you need to take to remove malware?
- Quarantine the system
- Disable system restore
- Remediate the system
- Schedule automatic scans and updates
- Enable system restore, create a restore point
- Educate the end user
How would you prevent fake web site from gaining access to your personal information through Internet Explorer?
Turn on the SmartScreen filter
This filter will scan and inform you about web site status, whether it’s suspicious, or fraudulent
A computer is infected with malware. You quarantine the system, disable system restore, remediate the computer, and update anti malware software. What should you do next?
Schedule automatic scans and updates for the anti malware software
If you discover an infected file, what should you do to ensure it can’t cause any more harm to your computer?
Quarantine the file
This can be done by placing the file on another drive
What are some symptoms of malware on a computer?
- popups
- browser redirection
- security alerts
- slower performance
What are the two parts of step 4 in the malware removal process “Remediate the infected system”?
- Update or install antimalware software
- Scan for and remove malware
Your computer is infected with PUM.bad.proxy malware. How can you fix this? (2 steps)
- On the connections tab of the Internet Properties box, click LAN settings, clear the “use a proxy server” checkbox
- Edit the ProxyServer and ProxyEnable registry keys under HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings hive