ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 97 - CS0-003 discussion

Report
Export

An employee accessed a website that caused a device to become infected with invasive malware. The incident response analyst has:

* created the initial evidence log.

* disabled the wireless adapter on the device.

* interviewed the employee, who was unable to identify the website that was accessed

* reviewed the web proxy traffic logs.

Which of the following should the analyst do to remediate the infected device?

A.
Update the system firmware and reimage the hardware.
Answers
A.
Update the system firmware and reimage the hardware.
B.
Install an additional malware scanner that will send email alerts to the analyst.
Answers
B.
Install an additional malware scanner that will send email alerts to the analyst.
C.
Configure the system to use a proxy server for Internet access.
Answers
C.
Configure the system to use a proxy server for Internet access.
D.
Delete the user profile and restore data from backup.
Answers
D.
Delete the user profile and restore data from backup.
Suggested answer: A

Explanation:

Updating the system firmware and reimaging the hardware is the best action to perform to remediate the infected device, as it helps to ensure that the device is restored to a clean and secure state and that any traces of malware are removed. Firmware is a type of software that controls the low-level functions of a hardware device, such as a motherboard, hard drive, or network card. Firmware can be updated or flashed to fix bugs, improve performance, or enhance security. Reimaging is a process of erasing and restoring the data on a storage device, such as a hard drive or a solid state drive, using an image file that contains a copy of the operating system, applications, settings, and files. Reimaging can help to recover from system failures, data corruption, or malware infections. Updating the system firmware and reimaging the hardware can help to remediate the infected device by removing any malicious code or configuration changes that may have been made by the malware, as well as restoring any missing or damaged files or settings that may have been affected by the malware. This can help to prevent further damage, data loss, or compromise of the device or the network. The other actions are not as effective or appropriate as updating the system firmware and reimaging the hardware, as they do not address the root cause of the infection or ensure that the device is fully cleaned and secured. Installing an additional malware scanner that will send email alerts to the analyst may help to detect and remove some types of malware, but it may not be able to catch all malware variants or remove them completely. It may also create conflicts or performance issues with other security tools or systems on the device. Configuring the system to use a proxy server for Internet access may help to filter or monitor some types of malicious traffic or requests, but it may not prevent or remove malware that has already infected the device or that uses other methods of communication or propagation. Deleting the user profile and restoring data from backup may help to recover some data or settings that may have been affected by the malware, but it may not remove malware that has infected other parts of the system or that has persisted on the device.

asked 02/10/2024
Lascelles Johnson
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first