A+ 220-902 U5 Objective 4.2 Study Aids

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

When an alert appears letting you know there is an update, install that update right away since it is probably in response to _____.

A recent threat

Web Browser Contains _____ that you don't remember downloading.

Additional Components

Pop-up windows often open as soon as you visit a website and are usually created by _____.

Advertisers

_____ is designed to detect and destroy computer viruses.

Antivirus Software

If _____ happen frequently and there are not many applications running, it is best to assume it's malware.

Applications crashes

Knowing what to _____ will increase the odd of staying protected.

Avoid

You must disable the System Restore Utility to remove the infected files from the _____.

C:\_Restore folder

When you are unable to connect to the Internet and have checked all the hardware related problems, the network needs to be _____

Checked

Once you have identified the malware and quarantine the system the next step is to _____.

Clean the system

Where do you go to remove add-ons extensions toolbars altering a browser in Mozilla Firefox

Click 3 vertical bars then choose Add-ons

Where do you go to remove add-ons extensions toolbars altering a browser in Google Chrome

Control icon (3 bars) > Settings > Extensions

Some rogue security software might: Slow your computer or _____ files

Corrupt

Some rogue security software might: Install malware that can go undetected as it steals your _____.

Data

Always keep your anti-malware software _____.

Date

If you suspect a system has been compromised you should _____, before you begin to scan with the antivirus software utility.

Disable System Restore

_____ allows you to remove the infected files before the system adds them to a restore point.

Disable System Restore

Remove temp files - go to the temp folder and delete all recently _____ files

Downloaded

It is important to _____ how to prevent viruses, you can have software installed, but you cannot rely only on that.

Educate users

Spyware and other unwanted software are not designed to be _____.

Efficient

_____ is a tool that displays detailed information about significant events (for example, programs that don't start as expected or updates that are downloaded automatically) on your computer

Event Viewer

_____ regularly backs up versions of your files in the Documents, Music, Pictures, Videos, and Desktop folders.

File History

If the original _____ are lost, damaged, or deleted, you can restore them.

Files

Email hijackers can delete your emails and contacts or setup auto _____.

Forward rules

Browser redirection or Browser Hijacking is a type of online _____.

Fraud

Some rogue security software might: Lure you into a _____

Fraudulent transaction

_____ is when someone has gained access to your email password and then either sends spam email, automated responses or emails with viruses to your contacts.

Hijacked email

Another common sign of malware infection is the sporadic web browser _____.

Home page change

When you're working with systems that are connected together through a Home Group, Workgroup or on a network domain, anything that affects one computer can _____.

Infect them all

When Pop-up Blocker is turned on, the _____ displays a message saying "Pop-up blocked. To see this pop-up or additional options click here."

Information bar

If you cannot get to the _____ but you are sure that network connectivity is fine you might be suffering from a malware infection.

Internet

Many antivirus software now come as a package with your _____ and are free to download.

Internet cable subscription

First thing to check is if you are using any foreign proxy in your Internet Options -> _____.

LAN Settings

Some rogue security software might: Disable Windows updates or disable updates to _____.

Legitimate antivirus software

Software designers create _____ pop-up windows that advertise security update software

Legitimate looking

You can choose the _____ you prefer, from blocking all pop-up windows to allowing the pop-ups that you want to see.

Level of blocking

NEVER reply to the Remove Me e-mail addresses or sites. This only confirms that you have a _____ and makes your e-mail address more valuable to sell to other spammers.

Live e-mail address

The proper steps to take to clean the system will depend on the _____ you're dealing with.

Malware

When applications crash it will be necessary to know if it's related to _____ or another issue.

Malware

Unwanted pop-ups are a sure sign of _____.

Malware infection

Windows' boot record can become corrupt which will prevent the OS from loading altogether, or even worse, the _____ can get corrupted.

Master boot record

Where do you go to check in Internet connectivity issues on the network?

Open the troubleshooter: Control Panel >Troubleshooting > Network and Internet

Never include your _____ in an email.

Password

Some rogue security software might: Use social engineering to steal your _____

Personal information

A recent, annoying sign of malware is the _____.

Pop-up

Some rogue security software might: Launch _____ windows with false or misleading alerts.

Pop-up

_____ is a feature in Internet browsers that lets you limit or block most pop-ups.

Pop-up Blocker

_____ are a form of online advertising intended to attract web traffic or capture email addresses.

Pop-ups

_____ will open as a small web browser window that appears on top of the website you're viewing.

Pop-ups

Lately, there has been a boom of _____ pop-up malware issues.

Porn-related

_____ - is a lightweight version of Windows used for the deployment of workstations and servers or troubleshooting an operating system while it is offline.

Pre-installation environments (WinPE)

Antivirus and Anti-Malware Software - Real-time _____ and/or scan and remove malware.

Protection

Some malware configures your browser to pass through an unsafe _____.

Proxy

Antivirus software will also _____ an infected file so that it can't run.

Quarantine

Whenever you're troubleshooting networked computers and identify any type of malware, the first step is to _____ away from the others.

Quarantine the Infected System

If you search using a search engine, click on a provided link, and are sent to a _____ it's possible malware issue.

Random link

One of the main uses of the _____ is to fix boot record errors.

Recovery Console

To reduce the chances of _____ schedule scans and updates to run regularly to kept everything you up-to-date.

Reinfection

_____ is a form of Internet fraud using computer malware (malicious software) that deceives or misleads users into paying money for fake or simulated removal of malware (so is a form of ransomware).

Rogue Security Software (Rogue antivirus)

_____ might appear in the list of search results when you are searching for trustworthy antispyware software, so it is important to protect your computer.

Rogue security software

_____, also known as scareware, is software that appears to be beneficial from a security perspective but provides limited or no security, generates erroneous or misleading alerts, or attempts to lure users into participating in fraudulent transactions.

Rogue security software

What should you do first if you're experiencing PC lockups

Rule out malware infection

What do you do in a situation where applications are crashing?

Run your anti-malware software right away

Claiming a system may also include booting to _____ or to a pre-installation environment

Safe Mode

Cleaning the system should include updating anti-malware software and using the appropriate _____ techniques.

Scan and removal

It is important that you have the antivirus software installed, keep it up to date, and have _____

Scheduled scans

You can perform a scan in between _____ if you suspect you have picked up a virus.

Scheduled scans

_____ These fake alerts are called scareware

Security alerts

_____ are fake threats disguised as Windows Security Alerts.

Security alerts

In order for file history feature to work, you must turn it on and _____.

Set it up

The resources Spyware programs use to track your activities and deliver advertisements can _____

Slow down your computer

Malware is well known for _____, be it network performance or the speed of application use.

Slowing down machines

_____ is unwanted or unsolicited email or "junk mail" that is sent out to people.

Spam

_____ errors in the software can make your computer crash.

Spyware

If you notice a sudden increase in the number of times, a certain program crashes, or if your computer is slower than normal at performing routine tasks, you may have _____ on your machine.

Spyware or other unwanted software

Scammers use malicious software to take control of your computer's Internet browser and change how and what it displays when you're _____.

Surfing the web

If you're experiencing files being renamed USE the _____ to determine which file is causing the issue, and then replace the file.

System File Checker tool (SFC.exe)

An infected file could be stored _____ as a backup file, and VirusScan will be unable to delete these files.

System Restore

The purpose of _____ is to backup files that are used by the operating system and specific software. In the situation of a malware infection the virus can be backed up by the system restore process.

System Restore

Spyware and other unwanted software can add _____ to your web browser that you don't want or need. Even if you remove these toolbars, they might return each time you restart your computer.

Toolbars

Where do you go to remove add-ons extensions toolbars altering a browser in Microsoft Internet Explorer

Tools > Manage add-ons > Toolbars and Extensions

There are a number of _____ antivirus/anti-malware software applications out there.

Trusted

When quarantining a system any network cables should be disconnected and Wi-Fi should be disabled until the computer has been _____.

Verified as clean

You can browse and restore different _____ of your files.

Versions

What are the symptoms of PC or operating system lockups?

Very high CPU usage, slow computer speed and memory shortage

If, unexpectedly, your system files are being renamed, removed or corrupted you have been invaded by a _____.

Virus

Schedule Scans and Run Updates - Just because you've cleaned a virus doesn't mean the system _____

Will not be attacked again

Turn off System Restore - Windows utilizes a restore utility that _____ selected files automatically to the C:\_Restore folder.

backs up

When your antivirus quarantines a file, it moves it to another location on your PC, and then _____ from running until you choose to restore it or remove it.

prevents the software

_____ Scan and removal techniques include (

safe mode, pre-installation environment

The_____ command scans all protected system files and replaces incorrect versions with correct Microsoft versions.

sfc /scannow

Some rogue security software might: Prevent you from visiting antivirus vendor _____.

websites

What are the main symptoms to look for to identify malware?

• PC slowdowns • Pop-ups • Changes of home or Google links • Browsers off-line • Web browser contains additional components

When you try to install Windows Updates, you get the following error: Failure configuring Windows updates. Reverting changes. Do not turn off your computer. What do you do?

• Restart your computer • Run windows update troubleshooter • Run System Restore • Use In Place Upgrade feature


संबंधित स्टडी सेट्स

ATI: Chapter 31 Angina and Myocardial Infarction

View Set

18.3 Directors and officers and shareholders

View Set

Series 7: Chapter 18. Investment Companies and other Packaged Products.

View Set

Introduction to Public Health Exam 2

View Set

PMK-EE E5 Leadership & Character

View Set

John of Damascus, Doctor of the Church

View Set

[Lección 4] Estructura 3.1 - En el cine

View Set