SK_deck_4701546 Flashcards

1
Q

List the 4 step computer path to access Windows Defender in Windows XP. pg .968

A

Choose Start, Control Panel, Security, Software Explorers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name a subset of Malware. pg. 968

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does spyware differ from malware? pg. 968

A

spyware works on behalf of a third party - rather than replicating like viruses it spreads to machines by users who inadvertently ask for it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What two programs did Microsoft release to combat spyware? pg. 968

A

Microsoft Security Essentials and Windows Defender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What Microsoft community can you join to help with isolating and reducing spyware? pg. 969

A

SpyNet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can you access SpyNet? pg. 969

A

via Windows Defender, click Tools voila! Microsoft SpyNet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

There are times when bad things happen to good ___.

A

people AND computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What feature was introduced with Windows XP to make recovery of the operating system easier through restore points? pg. 970

A

System Restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is like a backup of your configuration but not necessarily your data? pg. 970

A

restore point is a copy of your system configuration at a given point in time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name the 3 ways a restore point can be created. pg. 970

A
  1. Windows creates them automatically 2. manually created 3. during installation of some programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List the 4 step computer path to access System Restore in Windows Vista. pg. 971

A

Start, All Programs, Accessories, System Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

T/F System Restore does not affect any of your docs, pics, or other personal data, and the process is irreversible. pg. 971

A

False- it IS reversible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What will you find listed on the Restore Point log? pg. 971

A

restore points and backups that have been performed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the method used in Windows 7 to access System Protection? pg. 972

A

right-click My computer and choose Properties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What computer path do you take to create a Restore Point in Windows XP? pg. 972

A

Start, All Programs, Accessories, System Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

T/F CompTIA wants you to consider a 7-item list when addressing a possible malware infestation. pg. 973

A

True

17
Q

What’s the first thing you should do if you suspect malware? pg. 973

A

Identify and prove the type of malware, ie. spyware, virus, worm…

18
Q

What’s the second step on the 7-item list of addressing malware infestation? pg. 973

A

Quarantine

19
Q

What can be done to prevent the malware from creating a restore point? pg. 974

A

Disable System Restore

20
Q

What’s involved in Step 4: Remediating the infected system? pg. 974

A

Updating the antivirus software and using the appropriate scan and removal techniques

21
Q

What are a couple of removal techniques? pg. 974

A

booting into Safe Mode or a pre-installation environment

22
Q

Step #5? pg. 974

A

schedule scans and updates

23
Q

How can you configure an anti-malware program that doesn’t automatically run updates? pg. 974

A

Task Schedular

24
Q

Once the system is working properly, it’s important to do this 6th step which is? pg. 974

A

enable system restore and create a restore point

25
Q

And the last but not least final step is…??? pg, 974

A

Education provided to the end user, ie. what led to virus, what to avoid, or what to look for