SK_deck_4701546 Flashcards

(25 cards)

1
Q

List the 4 step computer path to access Windows Defender in Windows XP. pg .968

A

Choose Start, Control Panel, Security, Software Explorers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name a subset of Malware. pg. 968

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does spyware differ from malware? pg. 968

A

spyware works on behalf of a third party - rather than replicating like viruses it spreads to machines by users who inadvertently ask for it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What two programs did Microsoft release to combat spyware? pg. 968

A

Microsoft Security Essentials and Windows Defender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What Microsoft community can you join to help with isolating and reducing spyware? pg. 969

A

SpyNet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can you access SpyNet? pg. 969

A

via Windows Defender, click Tools voila! Microsoft SpyNet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

There are times when bad things happen to good ___.

A

people AND computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What feature was introduced with Windows XP to make recovery of the operating system easier through restore points? pg. 970

A

System Restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is like a backup of your configuration but not necessarily your data? pg. 970

A

restore point is a copy of your system configuration at a given point in time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name the 3 ways a restore point can be created. pg. 970

A
  1. Windows creates them automatically 2. manually created 3. during installation of some programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List the 4 step computer path to access System Restore in Windows Vista. pg. 971

A

Start, All Programs, Accessories, System Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

T/F System Restore does not affect any of your docs, pics, or other personal data, and the process is irreversible. pg. 971

A

False- it IS reversible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What will you find listed on the Restore Point log? pg. 971

A

restore points and backups that have been performed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the method used in Windows 7 to access System Protection? pg. 972

A

right-click My computer and choose Properties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What computer path do you take to create a Restore Point in Windows XP? pg. 972

A

Start, All Programs, Accessories, System Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

T/F CompTIA wants you to consider a 7-item list when addressing a possible malware infestation. pg. 973

17
Q

What’s the first thing you should do if you suspect malware? pg. 973

A

Identify and prove the type of malware, ie. spyware, virus, worm…

18
Q

What’s the second step on the 7-item list of addressing malware infestation? pg. 973

19
Q

What can be done to prevent the malware from creating a restore point? pg. 974

A

Disable System Restore

20
Q

What’s involved in Step 4: Remediating the infected system? pg. 974

A

Updating the antivirus software and using the appropriate scan and removal techniques

21
Q

What are a couple of removal techniques? pg. 974

A

booting into Safe Mode or a pre-installation environment

22
Q

Step #5? pg. 974

A

schedule scans and updates

23
Q

How can you configure an anti-malware program that doesn’t automatically run updates? pg. 974

A

Task Schedular

24
Q

Once the system is working properly, it’s important to do this 6th step which is? pg. 974

A

enable system restore and create a restore point

25
And the last but not least final step is...??? pg, 974
Education provided to the end user, ie. what led to virus, what to avoid, or what to look for