9.7 - Client Malware Protection

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1
New cards

Which malware type is designed to facilitate identity theft by gaining access to a user's online financial accounts?

Crimeware

2
New cards

Your Windows system has been infected with malware that has replaced the standard boot loader on the hard disk with its own malicious software.

Which type of exploit is being used in this scenario?

Rootkit

3
New cards

Which of the following types of malware are designed to scam money from the victim? (Select two.)

Scareware

Ransomware

4
New cards

Which of the following is a characteristic of a virus?

Must be attached to a file or program to run.

5
New cards

You have noticed malware on your network that is spreading from computer to computer and deleting files.

Which type of malware are you most likely dealing with?

Worm

6
New cards

You manage a Windows computer that is shared by multiple users.

Recently, a user downloaded and installed two malware programs on the computer. The applications had a .msi extension.

What is the first line of defense in protecting your system against applications like these from being copied or downloaded to your system?

Use anti-malware software that provides real-time protection.

7
New cards

Put the steps for the suggested procedure for remediation of an infected system in the order they should be performed in.

1. Identify the symptoms

2. Quarantine the infected system

3. Disable System Restore

4. Update anti-malware definitions

5. Scan for and remove malware

6. Schedule future anti-malware scans

7. Re-enable System Restore

8. Educate the end user

8
New cards

Which command can be used to attempt to repair infected files?

sfc

9
New cards

A user keeps attempting to open a text file. All that happens is a Command Prompt window flashes on screen and then disappears.

Which of the following actions will help you determine the cause of this issue?

Show full file extensions.

10
New cards

Once a piece of malware is detected and reverse-engineered, its unique characteristics are identified. Anti-malware programs use these characteristics to identify malware.

What do anti-malware programs call these unique characteristics of malware?

Signature