9.2.9 - Combat Malware (Practice Questions)
Scanning uses live system monitoring to detect malware immediately. This technique utilizes a database that needs to be updated regularly. Scanning is the quickest way to catch malware programs.
Anti-malware software utilizes different methods to detect malware. One of these methods is scanning. Which of the following best describes scanning?
ClamAv
Daphne has determined that she has malware on her Linux machine. She prefers to only use open-source software. Which anti-malware software should she use?
netstat -f -b
Daphne suspects a Trojan horse is installed on her system. She wants to check all active network connections to see which programs are making connections and the FQDN of where those programs are connecting to. Which command will allow her to do this?
Run anti-malware scans
Part of a penetration test is checking for malware vulnerabilities. During this process, the penetration tester will need to manually check many different areas of the system. After these checks have been completed, which of the following is the next step?
Isolate the system from the network immediately.
Which of the following is the first step you should take if malware is found on a system?