9.2.9 Practice Questions Flashcards

1
Q

Daphne has determined that she has malware on her Linux machine. She prefers to only use open-source software. Which anti-malware software should she use?

answer

Kaspersky

Bitdefender

ClamAV

Avira

A

ClamAV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Listen to exam instructions
Anti-malware software utilizes different methods to detect malware. One of these methods is scanning. Which of the following best describes scanning?

answer

Scanning establishes a baseline and keeps an eye on any system changes that shouldn’t happen. The program will alert the user that there is possible malware on the system.

Scanning uses live system monitoring to detect malware immediately. This technique utilizes a database that needs to be updated regularly. Scanning is the quickest way to catch malware programs.

Scanning aids in detecting new or unknown malware that is based on another known malware. Every malware has a fingerprint, or signature. If a piece of code contains similar code, the scan should mark it as malware and alert the user.

Scanning is when the anti-malware software opens a virtual environment to mimic CPU and RAM activity. Malware code is executed in this environment instead of the physical processor.

A

Scanning uses live system monitoring to detect malware immediately. This technique utilizes a database that needs to be updated regularly. Scanning is the quickest way to catch malware programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Listen to exam instructions
Which of the following is the first step you should take if malware is found on a system?

answer

Sanitize the system using updated anti-malware software.

Look through the event log for suspicious events.

Check for suspicious or unknown registry entries.

Isolate the system from the network immediately.

A

Isolate the system from the network immediately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Daphne suspects a Trojan horse is installed on her system. She wants to check all active network connections to see which programs are making connections and the FQDN of where those programs are connecting to. Which command will allow her to do this?

answer

netstat -a -b

netstat -f -a

netstat -f -a -b

netstat -f -b

A

netstat -f -b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Part of a penetration test is checking for malware vulnerabilities. During this process, the penetration tester will need to manually check many different areas of the system. After these checks have been completed, which of the following is the next step?

answer

Sanitize the system

Isolate system from network

Document all findings

Run anti-malware scans

A

Run anti-malware scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly