A+ 220-902 U5 Objective 4.2 Study Aids
When an alert appears letting you know there is an update, install that update right away since it is probably in response to _____.
A recent threat
Web Browser Contains _____ that you don't remember downloading.
Additional Components
Pop-up windows often open as soon as you visit a website and are usually created by _____.
Advertisers
_____ is designed to detect and destroy computer viruses.
Antivirus Software
If _____ happen frequently and there are not many applications running, it is best to assume it's malware.
Applications crashes
Knowing what to _____ will increase the odd of staying protected.
Avoid
You must disable the System Restore Utility to remove the infected files from the _____.
C:\_Restore folder
When you are unable to connect to the Internet and have checked all the hardware related problems, the network needs to be _____
Checked
Once you have identified the malware and quarantine the system the next step is to _____.
Clean the system
Where do you go to remove add-ons extensions toolbars altering a browser in Mozilla Firefox
Click 3 vertical bars then choose Add-ons
Where do you go to remove add-ons extensions toolbars altering a browser in Google Chrome
Control icon (3 bars) > Settings > Extensions
Some rogue security software might: Slow your computer or _____ files
Corrupt
Some rogue security software might: Install malware that can go undetected as it steals your _____.
Data
Always keep your anti-malware software _____.
Date
If you suspect a system has been compromised you should _____, before you begin to scan with the antivirus software utility.
Disable System Restore
_____ allows you to remove the infected files before the system adds them to a restore point.
Disable System Restore
Remove temp files - go to the temp folder and delete all recently _____ files
Downloaded
It is important to _____ how to prevent viruses, you can have software installed, but you cannot rely only on that.
Educate users
Spyware and other unwanted software are not designed to be _____.
Efficient
_____ is a tool that displays detailed information about significant events (for example, programs that don't start as expected or updates that are downloaded automatically) on your computer
Event Viewer
_____ regularly backs up versions of your files in the Documents, Music, Pictures, Videos, and Desktop folders.
File History
If the original _____ are lost, damaged, or deleted, you can restore them.
Files
Email hijackers can delete your emails and contacts or setup auto _____.
Forward rules
Browser redirection or Browser Hijacking is a type of online _____.
Fraud
Some rogue security software might: Lure you into a _____
Fraudulent transaction
_____ is when someone has gained access to your email password and then either sends spam email, automated responses or emails with viruses to your contacts.
Hijacked email
Another common sign of malware infection is the sporadic web browser _____.
Home page change
When you're working with systems that are connected together through a Home Group, Workgroup or on a network domain, anything that affects one computer can _____.
Infect them all
When Pop-up Blocker is turned on, the _____ displays a message saying "Pop-up blocked. To see this pop-up or additional options click here."
Information bar
If you cannot get to the _____ but you are sure that network connectivity is fine you might be suffering from a malware infection.
Internet
Many antivirus software now come as a package with your _____ and are free to download.
Internet cable subscription
First thing to check is if you are using any foreign proxy in your Internet Options -> _____.
LAN Settings
Some rogue security software might: Disable Windows updates or disable updates to _____.
Legitimate antivirus software
Software designers create _____ pop-up windows that advertise security update software
Legitimate looking
You can choose the _____ you prefer, from blocking all pop-up windows to allowing the pop-ups that you want to see.
Level of blocking
NEVER reply to the Remove Me e-mail addresses or sites. This only confirms that you have a _____ and makes your e-mail address more valuable to sell to other spammers.
Live e-mail address
The proper steps to take to clean the system will depend on the _____ you're dealing with.
Malware
When applications crash it will be necessary to know if it's related to _____ or another issue.
Malware
Unwanted pop-ups are a sure sign of _____.
Malware infection
Windows' boot record can become corrupt which will prevent the OS from loading altogether, or even worse, the _____ can get corrupted.
Master boot record
Where do you go to check in Internet connectivity issues on the network?
Open the troubleshooter: Control Panel >Troubleshooting > Network and Internet
Never include your _____ in an email.
Password
Some rogue security software might: Use social engineering to steal your _____
Personal information
A recent, annoying sign of malware is the _____.
Pop-up
Some rogue security software might: Launch _____ windows with false or misleading alerts.
Pop-up
_____ is a feature in Internet browsers that lets you limit or block most pop-ups.
Pop-up Blocker
_____ are a form of online advertising intended to attract web traffic or capture email addresses.
Pop-ups
_____ will open as a small web browser window that appears on top of the website you're viewing.
Pop-ups
Lately, there has been a boom of _____ pop-up malware issues.
Porn-related
_____ - is a lightweight version of Windows used for the deployment of workstations and servers or troubleshooting an operating system while it is offline.
Pre-installation environments (WinPE)
Antivirus and Anti-Malware Software - Real-time _____ and/or scan and remove malware.
Protection
Some malware configures your browser to pass through an unsafe _____.
Proxy
Antivirus software will also _____ an infected file so that it can't run.
Quarantine
Whenever you're troubleshooting networked computers and identify any type of malware, the first step is to _____ away from the others.
Quarantine the Infected System
If you search using a search engine, click on a provided link, and are sent to a _____ it's possible malware issue.
Random link
One of the main uses of the _____ is to fix boot record errors.
Recovery Console
To reduce the chances of _____ schedule scans and updates to run regularly to kept everything you up-to-date.
Reinfection
_____ is a form of Internet fraud using computer malware (malicious software) that deceives or misleads users into paying money for fake or simulated removal of malware (so is a form of ransomware).
Rogue Security Software (Rogue antivirus)
_____ might appear in the list of search results when you are searching for trustworthy antispyware software, so it is important to protect your computer.
Rogue security software
_____, also known as scareware, is software that appears to be beneficial from a security perspective but provides limited or no security, generates erroneous or misleading alerts, or attempts to lure users into participating in fraudulent transactions.
Rogue security software
What should you do first if you're experiencing PC lockups
Rule out malware infection
What do you do in a situation where applications are crashing?
Run your anti-malware software right away
Claiming a system may also include booting to _____ or to a pre-installation environment
Safe Mode
Cleaning the system should include updating anti-malware software and using the appropriate _____ techniques.
Scan and removal
It is important that you have the antivirus software installed, keep it up to date, and have _____
Scheduled scans
You can perform a scan in between _____ if you suspect you have picked up a virus.
Scheduled scans
_____ These fake alerts are called scareware
Security alerts
_____ are fake threats disguised as Windows Security Alerts.
Security alerts
In order for file history feature to work, you must turn it on and _____.
Set it up
The resources Spyware programs use to track your activities and deliver advertisements can _____
Slow down your computer
Malware is well known for _____, be it network performance or the speed of application use.
Slowing down machines
_____ is unwanted or unsolicited email or "junk mail" that is sent out to people.
Spam
_____ errors in the software can make your computer crash.
Spyware
If you notice a sudden increase in the number of times, a certain program crashes, or if your computer is slower than normal at performing routine tasks, you may have _____ on your machine.
Spyware or other unwanted software
Scammers use malicious software to take control of your computer's Internet browser and change how and what it displays when you're _____.
Surfing the web
If you're experiencing files being renamed USE the _____ to determine which file is causing the issue, and then replace the file.
System File Checker tool (SFC.exe)
An infected file could be stored _____ as a backup file, and VirusScan will be unable to delete these files.
System Restore
The purpose of _____ is to backup files that are used by the operating system and specific software. In the situation of a malware infection the virus can be backed up by the system restore process.
System Restore
Spyware and other unwanted software can add _____ to your web browser that you don't want or need. Even if you remove these toolbars, they might return each time you restart your computer.
Toolbars
Where do you go to remove add-ons extensions toolbars altering a browser in Microsoft Internet Explorer
Tools > Manage add-ons > Toolbars and Extensions
There are a number of _____ antivirus/anti-malware software applications out there.
Trusted
When quarantining a system any network cables should be disconnected and Wi-Fi should be disabled until the computer has been _____.
Verified as clean
You can browse and restore different _____ of your files.
Versions
What are the symptoms of PC or operating system lockups?
Very high CPU usage, slow computer speed and memory shortage
If, unexpectedly, your system files are being renamed, removed or corrupted you have been invaded by a _____.
Virus
Schedule Scans and Run Updates - Just because you've cleaned a virus doesn't mean the system _____
Will not be attacked again
Turn off System Restore - Windows utilizes a restore utility that _____ selected files automatically to the C:\_Restore folder.
backs up
When your antivirus quarantines a file, it moves it to another location on your PC, and then _____ from running until you choose to restore it or remove it.
prevents the software
_____ Scan and removal techniques include (
safe mode, pre-installation environment
The_____ command scans all protected system files and replaces incorrect versions with correct Microsoft versions.
sfc /scannow
Some rogue security software might: Prevent you from visiting antivirus vendor _____.
websites
What are the main symptoms to look for to identify malware?
• PC slowdowns • Pop-ups • Changes of home or Google links • Browsers off-line • Web browser contains additional components
When you try to install Windows Updates, you get the following error: Failure configuring Windows updates. Reverting changes. Do not turn off your computer. What do you do?
• Restart your computer • Run windows update troubleshooter • Run System Restore • Use In Place Upgrade feature