L17 - T17C - S6 – Best Practices for Malware Removal

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/4

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

5 Terms

1
New cards

The 7-step process for malware removal (IQDRSEE)

  1. Investigate and verify malware symptoms. 

  1. Quarantine infected systems. 

  1. Disable System Restore in Windows. 

  1. Remediate infected systems 

    • Update anti-malware software. 

    • Scanning and removal techniques (e.g., safe mode, preinstallation environment) 

  1. Schedule scans and run updates. 

  1. Enable System Restore and create a restore point in Windows. 

  1. Educate the end user 

2
New cards
  • On-access scanning

  • Detection

  • Most malware is discovered via ______ by an antivirus product.

  • If the malware is sophisticated enough to evade automated _____, certain symptoms may lead you to suspect infection

<ul><li><p>Most malware is discovered via ______ by an antivirus product.  </p></li><li><p>If the malware is sophisticated enough to evade automated _____, certain symptoms may lead you to suspect infection </p></li></ul><p></p>
3
New cards

Malware Encyclopaedia / Bestiary

  • Library of information held by antivirus vendors with complete information about the type, symptoms, purpose, and removal of viruses, worms, Trojans, and rootkits

    • Can be used to verify the symptoms that you discover on a local system against known malware indicators and behaviours

4
New cards

The first 4 steps of the 7-step malware best-practice routine

  1. Investigate and verify malware symptoms. 

  1. Quarantine infected systems. 

  1. Disable System Restore in Windows. 

  1. Remediate infected systems 

    • Update anti-malware software. 

    • Scanning and removal techniques (e.g., safe mode, preinstallation environment) 

5
New cards

Last 3 steps of the 7-step malware best-practice routine

  1. Schedule scans and run updates. 

  1. Enable System Restore and create a restore point in Windows. 

  1. Educate the end user