One of the best practices for malware removal involves the process of isolation of files and applications suspected of containing malware to prevent further execution and potential harm to the user's system. This process is referred to as:
Quarantine
Linux command that displays information about files and directories contained within the current working directory?
ls (list)
A term that describes a large network of Windows-based PCs under single administration?
Windows Domain
Which edition of Windows 10 by default does not include the Remote Desktop server component?
Windows Home
Name one example of a storage media drive physical destruction method:
An anti-malware software is kept up to date via what 2 updates?
Engine and signature
A Linux command that changes file access permissions:
chmod
In Windows Active Directory environment, this feature enables centralized management and configuration of operating systems, applications, and user account settings.
Group Policy
What is the physical memory limit for all 32-bit (x86) editions of Windows 10?
4 GB
A document issued by companies that conduct secure device/document disposal which verifies proper asset destruction and can be used for auditing purposes.
Certificate of Destruction
Name the two boot environments used for malware scanning and removal in MS Windows?
Safe Mode and WinPE
A Linux command that temporarily modifies security privileges to allow an execution of a single command that requires root access permissions is called:
sudo
A Windows Active Directory service that allows for grouping users and computers into containers where System administrators can assign Group Policy settings to manage the configuration and use of accounts and resources within:
Organizational Units (OUs)
A 64-bit (x64) Windows 10 Home edition provides support for up to:
128 GB
Which formatting type in MS Windows prevents data recovery by overwriting the contents of hard drive sectors?
standard format
Anti-malware software compares a file's characteristics against a database of known "___________" to detect if it is malicious.
signatures
What is the name of a command-line utility used for managing (i.e., finding, installing, or updating) software packages on Debian and Debian-based Linux distributions?
apt or apt-get
A command used to manually update Group Policy settings on a Windows machine without waiting for the scheduled refresh cycle?
gpupdate /force
What is the physical memory limit for the 64-bit (x64) Windows 10 Pro edition?
2 TB
Which of the terms listed below is used to describe the initial hard drive formatting typically performed at the factory by the drive manufacturer?
low level format
According to the CompTIA's best practice procedures for malware removal, what should be the last step of the malware removal process?
User education
A Linux command-line utility used for configuring network interfaces?
ip or ifconfig
On a Windows domain, this tool can be used by system administrators to configure initial desktop environment (which may include mapping a network drive or setting up access to a shared printer) for a specific user.
login script
Which 2 of the 64-bit (x64) Windows 10 editions provide(s) support for up to 6 TB of physical memory?
Pro for Workstations and Enterprise
Which format type in MS Windows does not erase disk data?
quick format