CompTIA Core 2 scenario, use best practice procedures for malware removal

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

A cyber technician removes malware from the organization's system and follows the guidance presented by CompTIA. While remediating the infected system, what should the technician be doing

Update the anti-malware software.

2
New cards

A helpdesk technician reviews the CompTIA best practice guide regarding malware removal as they are putting together a presentation for the businesses' cyber department. What is associated with remediating infected systems?

Use of scanning and removal techniques.

3
New cards

A software agent has completed the fifth step of CompTIA's best practices procedure on malware removal while working on a company device. While enabling system restore is part of the sixth step, what else should the agent consider part of that process?

Create a fresh restore point or system image.
Re-enable software firewalls.
Verify DNS configuration.

4
New cards

A consultant is troubleshooting a system reported as being infected by malware. The office's protocol is to follow the CompTIA best practice procedure. According to the procedure, what considerations should the consultant place while quarantining the infected system?

Disconnect the network link.
Scan attached removable media devices for malware.
Move the infected system to a sandbox.

5
New cards

A technician reviews the best practice procedure that CompTIA created regarding malware removal. What step(s) are associated with remediating infected systems?

Update anti-malware software.
Use of scanning and removal techniques

6
New cards

While using the CompTIA best practice for malware removal, a consultant transitions from remediating infected systems to re-enabling system restore points in Windows. What step did the consultant skip?

Fifth step

7
New cards

Upon remediating infected systems, the technician is ready to move to the next step of the CompTIA best practice procedure for malware removal. What is the next step in the CompTIA process?

Schedule scans and updates.

8
New cards

A software consultant is tasked with malware removal for a company asset and reviews the best practices procedure from CompTIA. What step in the process uses scanning and removal techniques?

Fourth step, part B

9
New cards

A cyber architect removed malware from an employee's computer, successfully quarantined the infected system, and disabled system restore. While following the CompTIA procedure for malware removal, what should the architect do as part of the remediation of infected systems?

Quarantine infected systems

10
New cards

A cyber analyst is attempting to remove malware from a company system and is following the steps of the CompTIA best practice procedure for malware removal. What step focuses on updating anti-malware software?

Fourth step

11
New cards

A helpdesk ticket specialist uses CompTIA's malware removal procedure while working on a company system. The specialist successfully runs scans and updates and begins preparing a document to educate end-point users. What step did the specialist omit from CompTIA's best practice procedure?

Sixth step

12
New cards

A software engineer is preparing a presentation regarding malware discovered on six company computers. Ensuring that the presentation was succinct but informative, the engineer used the best practice procedure for malware removal by CompTIA. What is the final step in CompTIA's procedure?

Educate the end-users.

13
New cards

A cyber technician follows the CompTIA best practice procedure on malware removal and is ready to remediate one of the company's infected systems. What tools are synonymous in remediating infected systems?

Antivirus software
Anti-malware software

14
New cards

A cyber architect is removing malware per CompTIA's best practice procedure. Upon re-enabling system restore points in Windows, the architect closes the ticket and considers the task complete. What did the architect fail to complete?

Seventh step

15
New cards

A help desk consultant removes malware from an employee's computer and follows the CompTIA best practice procedure. The consultant has just completed the second step to quarantine infected systems. What should the consultant do for the next step?

Disable system restore in Windows.

16
New cards

A technician reviews step 2 of the CompTIA best practice procedure for malware removal. While quarantining infected systems, what should the technician do first?

Disconnect the network link.

17
New cards

A technician is working on removing malware from a company system. While following the steps presented in CompTIA's best practice procedure for malware removal, the technician moves from investigating and verifying malware symptoms to disabling system restore points in Windows. What step did the technician skip in this scenario?

Second step

18
New cards

A technician is trying to troubleshoot a system impacted by malware. According to the CompTIA best practice procedure, what should also be done as a safety precaution when disabling system restore points?

Delete old system restore points and backup copies.

19
New cards

A specialist is developing a training exercise on malware removal and elects to use the CompTIA best practices procedure as the training model. While preparing notes for the training exercise, the specialist discusses quarantining infected systems and immediately transitions to remediating the infected systems. What step did the specialist overlook between these two steps?

Third step

20
New cards

A software technician is reviewing CompTIA's best practice procedure for malware removal. What step investigates and verifies malware symptoms?

First step

21
New cards

A cyber consultant has disabled the system restore feature in Windows. According to the CompTIA best practice procedure for malware removal, what is the next step for malware removal?

Remediate infected systems.