1/9
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which malware type is designed to facilitate identity theft by gaining access to a user's online financial accounts?
Crimeware
Your Windows system has been infected with malware that has replaced the standard boot loader on the hard disk with its own malicious software.
Which type of exploit is being used in this scenario?
Rootkit
Which of the following types of malware are designed to scam money from the victim? (Select two.)
Scareware
Ransomware
Which of the following is a characteristic of a virus?
Must be attached to a file or program to run.
You have noticed malware on your network that is spreading from computer to computer and deleting files.
Which type of malware are you most likely dealing with?
Worm
You manage a Windows computer that is shared by multiple users.
Recently, a user downloaded and installed two malware programs on the computer. The applications had a .msi extension.
What is the first line of defense in protecting your system against applications like these from being copied or downloaded to your system?
Use anti-malware software that provides real-time protection.
Put the steps for the suggested procedure for remediation of an infected system in the order they should be performed in.
1. Identify the symptoms
2. Quarantine the infected system
3. Disable System Restore
4. Update anti-malware definitions
5. Scan for and remove malware
6. Schedule future anti-malware scans
7. Re-enable System Restore
8. Educate the end user
Which command can be used to attempt to repair infected files?
sfc
A user keeps attempting to open a text file. All that happens is a Command Prompt window flashes on screen and then disappears.
Which of the following actions will help you determine the cause of this issue?
Show full file extensions.
Once a piece of malware is detected and reverse-engineered, its unique characteristics are identified. Anti-malware programs use these characteristics to identify malware.
What do anti-malware programs call these unique characteristics of malware?
Signature