Software Troubleshooting: Given a scenario, troubleshoot common PC security issues with appropriate tools and best practices Flashcards

1
Q

What software found in Vista helps to prevent malware and spyware infections?

A

Windows Defender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

After identifying a user’s computer has malware, what should your next step be?

A

Quarantine the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are attempting to uninstall a suspicious application, but the uninstall fails. How do you remove it in the easiest way possible?

A

System Restore to a state before the application was installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the most common way a computer gets infected in an office?

A

Opening an email attachment

Always scan attachments before opening them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What tool would allow you to see if any Trojan horses are being loaded at startup?

A

MSCONFIG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the recommended setting for UAC for the highest level of security?

A

Prompt for credentials on the secure desktop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A newly installed application can not access a network server. What should you check first?

A

Firewall settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of attack attempts to redirect you to a fake website?

A

Hyperlink/web spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

According to Comp TIA, what are the 6 steps you need to take to remove malware?

A
  1. Quarantine the system
  2. Disable system restore
  3. Remediate the system
  4. Schedule automatic scans and updates
  5. Enable system restore, create a restore point
  6. Educate the end user
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How would you prevent fake web site from gaining access to your personal information through Internet Explorer?

A

Turn on the SmartScreen filter

This filter will scan and inform you about web site status, whether it’s suspicious, or fraudulent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A computer is infected with malware. You quarantine the system, disable system restore, remediate the computer, and update anti malware software. What should you do next?

A

Schedule automatic scans and updates for the anti malware software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If you discover an infected file, what should you do to ensure it can’t cause any more harm to your computer?

A

Quarantine the file

This can be done by placing the file on another drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some symptoms of malware on a computer?

A
  • popups
  • browser redirection
  • security alerts
  • slower performance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the two parts of step 4 in the malware removal process “Remediate the infected system”?

A
  • Update or install antimalware software

- Scan for and remove malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Your computer is infected with PUM.bad.proxy malware. How can you fix this? (2 steps)

A
  • On the connections tab of the Internet Properties box, click LAN settings, clear the “use a proxy server” checkbox
  • Edit the ProxyServer and ProxyEnable registry keys under HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings hive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some warning signs to indicate a system has malware?

A
  • Search result redirection
  • Computer performance degrades
  • Firewall alerts
  • Random popups
  • Anti virus won’t update
  • Hard drive activity light is always on
  • Increased spam email
17
Q

How would you protect an email from being read by an unauthorized user?

A

Encrypt the outgoing message