ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 395 - 220-1102 discussion

Report
Export

A workstation is displaying a message indicating that a user must exchange cryptocurrency for a decryption key. Which of the following is the best way for a technician to return the device to service safely?

A.
Run an AV scan.
Answers
A.
Run an AV scan.
B.
Reinstall the operating system
Answers
B.
Reinstall the operating system
C.
Install a software firewall.
Answers
C.
Install a software firewall.
D.
Perform a system restore.
Answers
D.
Perform a system restore.
E.
Comply with the on-screen instructions.
Answers
E.
Comply with the on-screen instructions.
Suggested answer: B

Explanation:

The best way for a technician to return the device to service safely is to reinstall the operating system. This is because the device is infected by ransomware, which is a form of malware that encrypts files and demands payment for decryption. Reinstalling the operating system will erase the ransomware and restore the device to its original state. However, this will also delete any data that was not backed up before the infection. Therefore, it is important to have regular backups of critical data and protect them from ransomware attacks1.

The other options are not effective or safe for ransomware recovery. Running an AV scan may not detect or remove the ransomware, especially if it is a new or unknown variant. Installing a software firewall may prevent future attacks, but it will not help with the current infection. Performing a system restore may not work if the ransomware has corrupted or deleted the restore points.

Complying with the on-screen instructions is not advisable, as it will encourage the attackers and there is no guarantee that they will provide the decryption key after receiving the payment.

To prevent and recover from ransomware attacks, it is recommended to follow some best practices, such as234:

Use strong passwords and multifactor authentication for all accounts and devices.

Keep all software and firmware updated with the latest security patches.

Avoid opening suspicious or unsolicited emails and attachments.

Educate users and staff on how to recognize and report phishing and social engineering attempts.

Use antivirus software and enable real-time protection.

Enable network segmentation and firewall rules to limit the spread of ransomware.

Implement a Zero Trust security model to verify all requests and devices before granting access.

Create and test backups of critical data and store them offline or in a separate network.

Recover safely by isolating the infected devices, identifying the ransomware variant, and restoring data from backups.

Report any ransomware incidents to law enforcement agencies and seek help from experts.

asked 02/10/2024
jonathan siu
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first