IT CertificationsAnswer Key

Comptia Malware Removal Steps 1102

13 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

One of the best practices for malware removal involves the process of isolation of files and applications suspected of containing malware to prevent further execution and potential harm to the user's system. This process is referred to as:

ANSWER

Quarantine

QUESTION 2

Which of the following should be the first step of the malware-removal procedure?

ANSWER

Investigating and verifying malware symptoms

QUESTION 3

According to the CompTIA's best practice procedures for malware removal, putting a malware-infected Windows-based system into a quarantine should be the next step after:

ANSWER

Investigating and verifying malware symptoms

QUESTION 4

According to the CompTIA's best practice procedures for malware removal, disabling System Restore on a malware-infected Windows-based system should be performed as the next step after:

ANSWER

Isolating the infected system

QUESTION 5

Which of the following steps in Windows 10 provides access to an interface used for configuring restore settings, managing disk space, and deleting restore points?

ANSWER

Control Panel (icon view) > Recovery > Configure System Restore > Configure... Control Panel (icon view) > Security and Maintenance > Recovery > Configure System Restore > Configure... Control Panel (category view) > System and Security > Security and Maintenance > Recovery > Configure System Restore > Configure... Control Panel (category view) > System and Security > Review your computer's status and resolve issues (under Security and Maintenance) > Recovery > Configure System Restore > Configure... Windows Run dialog box > type in: sysdm.cpl + press Enter > System Protection > Configure... Windows Run dialog box > type in: wscui.cpl + press Enter > Recovery > Configure System Restore > Configure...

QUESTION 6

According to the CompTIA's best practice procedures for malware removal, removing malicious software on a Windows-based system should be performed as the next step after:

ANSWER

Disabling System Restore

QUESTION 7

An anti-malware database entry used for identifying malicious code is referred to as malware:

ANSWER

Signature

QUESTION 8

An anti-malware software is kept up to date via:

ANSWER

Engine updates Signature updates

QUESTION 9

The actual process of malware removal should be preceded by:

ANSWER

the application of anti-malware software updates.

QUESTION 10

Which of the answers listed below refer to boot environments used for malware scanning and removal in MS Windows?

ANSWER

Safe Mode WinPE

QUESTION 11

According to the CompTIA's best practice procedures for malware removal, scheduling scans and running updates on a Windows-based system should be performed as the next step after:

ANSWER

Removing malware from the system

QUESTION 12

According to the CompTIA's best practice procedures for malware removal, enabling System Restore and creating a restore point in Windows should be performed as the next step after:

ANSWER

Scheduling scans and running updates

QUESTION 13

According to the CompTIA's best practice procedures for malware removal, user education should be:

ANSWER

the last step of the malware removal process.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials