Two best practices for creating passwords.
What are sufficiently long passwords (12+) and to use memorable phrases without any personal info?
The purpose of the real time protection button.
What is disabling the host firewall temporarily?
Examples of a trusted source for downloads.
What are app stores or extension stores?
A type of malware that hijacks the user's resources, namely GPU, to perform a rogue operation (namely mining cryptocurrency).
What is a cryptominer?
One of the first steps to removing malware on a computer to stop the spread.
What is a quarantine?
End user best practices for security.
What are logging off when away from the computer, preventing physical theft, and securing personally identifiable information (PII) and passwords?
The purpose of the Encrypting File System (EFS)? Not available on Windows Home.
What is encrypting specific files and folders so that they are password protected?
A browser add on that adds or changes features of that browser through an application programming interface (API), like adding an extra toolbar.
What is an extension?
The type of malware that uses a computers scripting environment to create malicious processes in the memory.
What is fileless malware?
After quarantining infected systems, you should ____ to prevent reinfection.
What is disable system restore?
What are two account management steps you could take to secure your account?
What are changing the default admin password and disabling the guest account?
Windows' Full Disk Encryption product that encrypts an entire drive rather than a single file or folder. Not available on Windows Home.
What is Windows Bitlocker?
What is a password manager?
A common security issue symptom in a browser.
What is a certificate warning?
The most effective tool for removing malware is ____.
What is antivirus (or antimalware)?
What are restricting login times, failed attempts lockouts, concurrent logins, and using timeouts/screen locks?
True or False. Users can see folders in file explorer that have been encrypted.
What is True?
The lock icon next to a browser's URL field indicates that a website has a valid ____.
What is digital certificate?
Symptoms of malware that are unlikely to be caused by other system issues.
What are missing or renamed files, new executables with similar names to existing ones, system/personal files with different dates/sizes than known good versions, and files with changed permission attributes that cause "Access Denied" errors?
Some tools and techniques you may need to use for manual malware removal.
What are the task manager, the command line, msconfig, and even manual disk removal?
A set of commands to run when the flash drive is plugged in to a computer.
What is autorun.inf on a flash drive?
Logical security technologies designed to prevent malware from running on a host regardless of the permissions available - Ex: User Account Control (UAC).
What is execution control?
This validates the identity of a web server.
What is a certificate authority (CA)?
A more common name for a Remote Access Trojan (RAT).
What is a backdoor?
An automated task that can help prevent malware infections.
What are antivirus scans?