a. Up to date anti-virus software and updated firewall.
2. Your employees e-mail file attachments to each other and externally through the organization’s firewall and Internet connection. What security countermeasures can you implement to help mitigate the risk of rogue e-mail attachments and URL web links?
a.
3. Why is it recommended to do an anti-virus signature file update before performing an anti-virus scan on your computer?
a. So you have the most up to date anti-virus signature
4. Once a file is found malicious on your computer what are the default settings for USB/removable device scanning?What should organization do regarding use of USB hard drives and slots on existing computers and devices?
5. If you find a suspect executable and wish to perform “dynamic analysis” what does that mean?
6. What is a malware and malicious code sandbox? How you test the
7. What are typical indicators that your computer system is compromised?
a. System crashes
b. Waiting for programs
c. Antivirus is disabled
d. Desktop icons have changed
e. Pop-up ads
8. What is a rootkit and what threat does it incur on systems?
a. Rootkit is association with malware. Once installed, it becomes possible to hide the intrusion as well as to maintain privileged access. The key is the root/Administrator access. Full control over a system means that existing software can be modified, including software that might otherwise be used to detect or circumvent it.
9. What security countermeasures are available to combat against root kits and malicious software?
a. Install a good antimalware solution on