Troubleshoot Workstation Security Issues Flashcards

lesson 17C (63 cards)

1
Q
A

Actual Keylogger—Windows software that can run in the background to monitor different kinds of
computer activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A

WannaCry ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A

Untrusted certificate warning in Mozilla Firefox.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A

Threats discovered by Windows Defender Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A

Microsoft’s Security Intelligence knowledge base can be used to obtain additional information about threats discovered by Windows Defender Antivirus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A

Microsoft’s Windows Defender Antivirus uses a system of continual threat/definition updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malware vectors

A

refer to the methods by which malware executes and spreads. Common types include viruses, which infect executable files; boot sector viruses, which hijack a disk’s boot process; and Trojans, which masquerade as legitimate software and often establish persistence by running at startup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Malware

A

is malicious software designed to harm systems, with classifications based on how it spreads and executes, aiding in identifying sources and impacts of security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

vector

A

is the method by which the malware executes on a computer and potentially spreads to other network hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Viruses

A

embed themselves in executable files (.EXE, .MSI, .DLL, etc.) and activate when the file runs, often gaining the same privileges as the infected process. Early viruses spread rapidly, while modern ones use stealth techniques to maintain control over a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malware payload

A

classification focuses on the actions malware performs beyond replication or persistence, helping to identify its specific impact on a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Backdoors,

A

often implemented as remote access Trojans (RATs), grant attackers unauthorized access to a system, enabling data exfiltration, malware installation, or botnet integration for launching attacks. Threat actors establish covert command and control (C2) connections, often embedding commands within HTTPS or DNS traffic to evade detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spyware

A

alters browser settings, monitors activity, and can redirect DNS queries to spoofed sites, compromising security and user privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

keylogger

A

is a form of spyware that records keystrokes, allowing attackers to capture sensitive information like passwords and credit card details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Keyloggers software/hardware

A

can be implemented as software that transmits keystrokes to an external server or as hardware devices that intercept inputs via modified USB adapters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Rootkits

A

are advanced malware that gain SYSTEM-level privileges, often exploiting vulnerabilities or escalating privileges post-installation. They can conceal their presence by modifying system processes, bypassing detection in tools like Task Manager, ps, or netstat, and even wiping system logs to further evade security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Ransomware

A

extorts victims by either blocking access to their systems or encrypting files, demanding payment to restore access. Crypto-ransomware, like Cryptolocker, encrypts data, making recovery nearly impossible without backups. Attackers use anonymous payment methods like cryptocurrency to evade law enforcement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cryptomining, or cryptojacking

A

hijacks a system’s resources to mine cryptocurrency, leveraging immense computing power to generate digital coins. Attackers often deploy cryptominers across botnets to maximize mining efficiency while remaining undetected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

malware signs

A

Unexpected system behavior or unauthorized configuration changes are common signs of malware infection. Identifying symptoms based on malware vectors and payloads helps determine the appropriate troubleshooting and remediation steps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

malware infection issues

A

Performance issues like system slowdowns, boot failures, and network disruptions may indicate malware infection, requiring antivirus scans and potential quarantine for further investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Frequent crashes

A

of security-related applications like antivirus, firewalls, and Windows Update can indicate malware infection. Malware often targets vulnerable third-party software, especially browser plug-ins. If reputable software begins failing repeatedly, malware should be suspected, and quarantining or monitoring procedures applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

file system errors

A

File system anomalies, such as missing or renamed files, unauthorized executables mimicking system processes, altered file attributes, and unexpected access errors, often indicate malware infection. These issues warrant immediate investigation and system quarantine to prevent further compromise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Fake security alerts

A

Malware can exploit push notifications to mimic Windows alerts, tricking users into installing harmful software. Fake security alerts may lead to drive-by downloads or rogue antivirus scams, where attackers impersonate support representatives to gain remote access. Vigilance against unsolicited alerts and cold calls is essential to prevent infection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Malware targeting browsers

A

can lead to unexpected pop-ups, altered settings, and performance issues, often signaling infection by spyware or adware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
# malware Redirection
occurs when a user is sent to an unintended page, often mimicking the original site. Adware may use it for traffic generation, while spyware can exploit it for credential theft. If redirection is detected, check the HOSTS file for malicious entries, verify DNS server settings, and compare search results with a trusted workstation.
26
# malware Certificate warnings
appear when a browser encounters an untrusted or invalid certificate, replacing the padlock icon with an alert. The URL may be displayed with a strikethrough, and access to the site is often restricted to prevent security risks.
27
Certificate warnings causes
can arise from untrusted, mismatched, or expired certificates and may signal misconfigurations or malware attempting to intercept secure connections.
28
Malware Removal
CompTIA's seven-step procedure for malware removal emphasizes investigating symptoms, quarantining infected systems, disabling System Restore, updating anti-malware software, scanning for threats, scheduling regular scans, re-enabling System Restore, and educating users. Antivirus vendors maintain malware encyclopedias that help identify and remove threats by matching system symptoms to known behaviors.
29
Infected Systems Quarantine
Once malware symptoms are identified, quarantining the infected system and disabling System Restore help prevent further spread and ensure effective remediation.
30
To quarantine an infected system
prevent users with administrative privileges from signing in to reduce the risk of malware compromising accounts. Disconnect the network link to stop malware from spreading, and move the system to a secure segment or sandbox for remediation. Scan any attached removable media to identify potential sources of infection and prevent further contamination.
31
Disabling System Restore and backup systems
like File History helps prevent reinfection, as malware may have compromised previous restore points. If backups are necessary, scanning them with antivirus software ensures they are free of infection before use.
32
Antivirus software
is the primary tool for malware removal, but if an infection evades detection, using an alternative suite or scanning the disk from another system may be necessary. Modern antivirus solutions protect against a wide range of threats, including viruses, worms, Trojans, ransomware, spyware, and cryptominers. Infected files can be cleaned, quarantined, or deleted, with configurable settings for handling detected threats.
33
Advanced malware infections
may require manual removal steps and system reconfiguration to restore security. This process typically involves terminating suspicious processes in Task Manager, executing commands in a terminal or editing the registry, booting into Safe Mode via `msconfig`, using recovery media or WinPE for a clean command environment, and scanning the infected disk from another system to prevent cross-infection.
34
OS reinstallation
If malware becomes deeply embedded in a system, antivirus software may be unable to recover infected files. In such cases, a complete system restore is necessary, which includes reformatting the disk, reinstalling the OS and software, and restoring data from a clean backup to ensure a secure environment.
35
To prevent malware reinfection
after cleaning a system, implement security best practices such as keeping software and antivirus definitions up to date, enabling firewalls, using strong authentication methods, and restricting administrative privileges. Regular system monitoring and user education also help mitigate future security risks.
36
On-access scanning
ensures security software checks files in real time before they are opened, preventing malicious files from executing. While it may slightly impact system performance, this proactive defense is crucial for maintaining robust malware protection.
37
# malware payloads Backdoors
particularly RATs, are a serious concern because they provide remote access for an attacker, enabling data exfiltration and further compromise.
38
# malware payload command-and-control (C2)
attackers maintain communication with compromised systems after gaining initial access to a network, allowing them to issue commands and control those systems.
39
A Remote Access Trojan (RAT)
is a type of malware that gives an attacker remote control over a device or network. It allows them to access and manipulate the system, often without the victim's knowledge. RATs are often disguised as legitimate software or applications, making them difficult to detect.
40
Troubleshoot Desktop Symptoms
Unexpected system behavior, sluggish performance, and network disruptions can indicate malware infection, requiring antivirus scans, close monitoring, or device isolation for further investigation.
41
Application Crashes and Service Problems
Frequent crashes of security applications and system tools, along with failed updates, may indicate malware infection, requiring isolation, monitoring, and verification of file integrity.
42
File system anomalies
such as missing or renamed files, unauthorized executables mimicking system utilities, altered file timestamps, and unexpected permission changes, can indicate malware infection. Since these issues rarely stem from benign causes, affected systems should be quarantined and thoroughly investigated.
43
Desktop Alerts and Notifications
Malware can exploit push notifications to display fake alerts, tricking users into installing malicious software or visiting sites that enable drive-by downloads.
44
Rogue antivirus
disguises Trojans through fake security alerts or fraudulent support calls, tricking users into enabling remote access for attackers. is a type of malware that falsely claims to be a legitimate antivirus program.
45
Browser infections
can cause frequent pop-ups, unauthorized toolbar installations, homepage changes, unusual search results, sluggish performance, and excessive crashes.
46
Unauthorized redirection
occurs when a user is sent to an unintended webpage, often mimicking legitimate sites. Adware uses this for traffic manipulation, while spyware may capture authentication details. To troubleshoot, check the HOSTS file for malicious entries, verify DNS server configurations, and compare search results with a known-good workstation.
47
48
Certificate warnings def.
indicate an untrusted or invalid site security certificate, displaying alert icons, strikethrough URLs, and possible content blocking in the browser.
49
Certificate warnings causes
can arise due to a self-signed or untrusted certificate authority (CA), a mismatch between the browser-requested FQDN and the certificate's subject name, or an expired/revoked certificate.
50
Improper certificate
use can indicate a misconfigured site or a malware attack attempting to redirect users to a spoofed page. In a **man-in-the-middle (MITM) attack**, a malicious proxy intercepts a secure request and presents a fake certificate. If accepted or overridden by the user, the attacker gains control over the session, allowing them to intercept and manipulate encrypted traffic without detection. Analyzing certificate details and verifying URLs is crucial to identifying and mitigating such threats.
51
seven-step malware removal process
includes verifying symptoms, quarantining infected systems, disabling System Restore, updating and scanning with anti-malware tools, scheduling future scans, re-enabling System Restore, and educating users. Antivirus vendors maintain databases of malware types, symptoms, and removal methods to assist in identifying and mitigating threats effectively.
52
Infected Systems Quarantine
malware symptoms are confirmed, quarantining the infected system prevents further spread while disabling System Restore ensures that malicious files aren’t inadvertently restored. These steps help contain the infection before remediation.
53
Quarantine Infected Systems
prevents malware from spreading by restricting network communication and administrative access. Disconnect the device from the network, move it to a secure segment or sandbox, and ensure that necessary tools can be accessed without compromising the production network. Additionally, scan and isolate any removable media that may have been used, as it could harbor the infection.
54
sandbox
is a controlled and isolated environment used to safely analyze and execute potentially malicious code or applications.
55
Disabling System Restore
prevents reinfection by ensuring that malware isn't restored from previous backups. Since automated backup systems like File History may also contain infected files, it's safest to delete old restore points. If retention is necessary, scanning backups with antivirus software helps verify their integrity before recovery.
56
Malware Removal Tools and Methods
Antivirus software is the primary tool for malware removal, but if it fails to detect a threat, using a different suite or scanning the disk from another system may be necessary. Modern antivirus solutions protect against various threats, including viruses, worms, Trojans, ransomware, and cryptominers. Infected files can be cleaned, quarantined, or deleted, with false positives occasionally requiring manual review.
57
Recovery mode for malware removal
involves manually disabling persistence mechanisms and restoring the system to a secure baseline. This includes terminating suspicious processes via Task Manager, using regedit to remove malicious registry entries, booting into Safe Mode with **msconfig**, running commands in Windows Preinstallation Environment (WinPE), and scanning the infected disk from a separate system while preventing cross-infection.
58
OS reinstallation
If malware has embedded itself deeply into the system, antivirus software may be ineffective, requiring a full OS reinstallation. This process includes **reformatting the disk, reinstalling the OS and applications**, and restoring data from a verified clean backup to eliminate persistent threats.
59
# malware prevention On-access scanning
enables antivirus software to inspect files when they are accessed, preventing malware execution before it occurs. While it may slightly impact performance, it is crucial for real-time protection.
60
# malware prevention Scheduled scans
help detect malware proactively but can affect system performance, so they should run when the computer is idle. Regular updates to malware definitions and antivirus engines are essential for maintaining strong security.
61
# malware prevention Re-enable System Restore
After malware removal, re-enable System Restore and automatic backups, create a fresh restore point, validate security-critical services, inspect DNS settings for spoofing risks, and restore firewall configurations to block unauthorized access. Conduct a final antivirus scan before safely returning the system to service.
62
# malware prevetion User education
is critical for malware prevention, as untrained individuals are vulnerable to phishing and social engineering attacks. Training should cover password management, security features, threat awareness, safe browsing and email practices, and anti-phishing techniques. Continuous education ensures that knowledge remains up-to-date against evolving threats.
63