Malware Removal
Linux Commands
Active Directory
MS Windows Edition
Data Destruction Methods
100

One of the best practices for malware removal involves the process of isolation of files and applications suspected of containing malware to prevent further execution and potential harm to the user's system. This process is referred to as:

Quarantine

100

Linux command that displays information about files and directories contained within the current working directory?

ls (list)

100

A term that describes a large network of Windows-based PCs under single administration?

Windows Domain

100

Which edition of Windows 10 by default does not include the Remote Desktop server component?

Windows Home

100

Name one example of a storage media drive physical destruction method: 

  • Shredding
  • Drilling
  • Degaussing
  • Incinerating
200

An anti-malware software is kept up to date via what 2 updates?

Engine and signature

200

A Linux command that changes file access permissions:

chmod

200

In Windows Active Directory environment, this feature enables centralized management and configuration of operating systems, applications, and user account settings.

Group Policy


200

What is the physical memory limit for all 32-bit (x86) editions of Windows 10?

4 GB

200

A document issued by companies that conduct secure device/document disposal which verifies proper asset destruction and can be used for auditing purposes.

Certificate of Destruction

300

Name the two boot environments used for malware scanning and removal in MS Windows? 

Safe Mode and WinPE

300

A Linux command that temporarily modifies security privileges to allow an execution of a single command that requires root access permissions is called:

sudo

300

A Windows Active Directory service that allows for grouping users and computers into containers where System administrators can assign Group Policy settings to manage the configuration and use of accounts and resources within:

Organizational Units (OUs)

300

 A 64-bit (x64) Windows 10 Home edition provides support for up to:

128 GB

300

Which formatting type in MS Windows prevents data recovery by overwriting the contents of hard drive sectors?

standard format

400

Anti-malware software compares a file's characteristics against a database of known "___________" to detect if it is malicious.

signatures

400

What is the name of a command-line utility used for managing (i.e., finding, installing, or updating) software packages on Debian and Debian-based Linux distributions?

apt or apt-get

400

A command used to manually update Group Policy settings on a Windows machine without waiting for the scheduled refresh cycle?

gpupdate /force

400

What is the physical memory limit for the 64-bit (x64) Windows 10 Pro edition?

2 TB

400

Which of the terms listed below is used to describe the initial hard drive formatting typically performed at the factory by the drive manufacturer?

low level format

500

According to the CompTIA's best practice procedures for malware removal,  what should be the last step of the malware removal process?

User education

500

A Linux command-line utility used for configuring network interfaces?

ip or ifconfig

500

On a Windows domain, this tool can be used by system administrators to configure initial desktop environment (which may include mapping a network drive or setting up access to a shared printer) for a specific user.

login script

500

Which 2 of the 64-bit (x64) Windows 10 editions provide(s) support for up to 6 TB of physical memory?

Pro for Workstations and Enterprise

500

Which format type in MS Windows does not erase disk data?

quick format