SK_deck_4701546 Flashcards Preview

Night 801 > SK_deck_4701546 > Flashcards

Flashcards in SK_deck_4701546 Deck (25):
1

List the 4 step computer path to access Windows Defender in Windows XP. pg .968

Choose Start, Control Panel, Security, Software Explorers

2

Name a subset of Malware. pg. 968

spyware

3

How does spyware differ from malware? pg. 968

spyware works on behalf of a third party - rather than replicating like viruses it spreads to machines by users who inadvertently ask for it

4

What two programs did Microsoft release to combat spyware? pg. 968

Microsoft Security Essentials and Windows Defender

5

What Microsoft community can you join to help with isolating and reducing spyware? pg. 969

SpyNet

6

How can you access SpyNet? pg. 969

via Windows Defender, click Tools voila! Microsoft SpyNet

7

There are times when bad things happen to good ___.

people AND computers

8

What feature was introduced with Windows XP to make recovery of the operating system easier through restore points? pg. 970

System Restore

9

What is like a backup of your configuration but not necessarily your data? pg. 970

restore point is a copy of your system configuration at a given point in time

10

Name the 3 ways a restore point can be created. pg. 970

1. Windows creates them automatically 2. manually created 3. during installation of some programs

11

List the 4 step computer path to access System Restore in Windows Vista. pg. 971

Start, All Programs, Accessories, System Tools

12

T/F System Restore does not affect any of your docs, pics, or other personal data, and the process is irreversible. pg. 971

False- it IS reversible

13

What will you find listed on the Restore Point log? pg. 971

restore points and backups that have been performed

14

What is the method used in Windows 7 to access System Protection? pg. 972

right-click My computer and choose Properties

15

What computer path do you take to create a Restore Point in Windows XP? pg. 972

Start, All Programs, Accessories, System Tools

16

T/F CompTIA wants you to consider a 7-item list when addressing a possible malware infestation. pg. 973

True

17

What's the first thing you should do if you suspect malware? pg. 973

Identify and prove the type of malware, ie. spyware, virus, worm...

18

What's the second step on the 7-item list of addressing malware infestation? pg. 973

Quarantine

19

What can be done to prevent the malware from creating a restore point? pg. 974

Disable System Restore

20

What's involved in Step 4: Remediating the infected system? pg. 974

Updating the antivirus software and using the appropriate scan and removal techniques

21

What are a couple of removal techniques? pg. 974

booting into Safe Mode or a pre-installation environment

22

Step #5? pg. 974

schedule scans and updates

23

How can you configure an anti-malware program that doesn't automatically run updates? pg. 974

Task Schedular

24

Once the system is working properly, it's important to do this 6th step which is? pg. 974

enable system restore and create a restore point

25

And the last but not least final step is...??? pg, 974

Education provided to the end user, ie. what led to virus, what to avoid, or what to look for