127. Organizations should strongly consider rebuilding a system that has which of the following malware incident characteristics?
1. Unauthorized administrator-level access.
2. Changes to system files.
3. The system is unstable.
4. The extent of damage is unclear.
a. 1 only
b. 2 and 3
c. 3 and 4
d. 1, 2, 3, and 4
128. Which of the following ways should be used to rebuild an infected host with malware incident?
1. Reinstalling the operating system
2. Reinstalling the application systems
3. Securing the operating and application systems
4. Restoring the data from known good backups
a. 1 and 2
b. 3 only
c. 1, 2, and 3
d. 1, 2, 3, and 4
129. Lessons learned from major malware incidents improve which of the following?
1. Security policy
2. Software configurations
3. Malware prevention software deployments
4. Malware detection software deployments
a. 1 only
b. 1 and 2
c. 3 and 4
d. 1, 2, 3, and 4
130. Which of the following is the correct tool and technology deployment sequence for containing malware incidents, especially when a worm attacks the network service?
1. Internet border and internal routers
2. Network-based firewalls
3. Network- and host-based antivirus software
4. Host-based firewalls
a. 1, 2, 4, and 3
b. 2, 3, 1, and 4
c. 3, 4, 2, and 1
d. 4, 2, 1, and 3
Network- and host-based antivirus software does detect and stop the worm, and identify and clean the infected systems.
Host-based firewalls do block worm activity from entering or exiting hosts, reconfigure the host-based firewall itself to prevent exploitation by the worm, and update the host-based firewall software so that it is no longer exploitable.
Network-based firewalls do detect and stop the worm from entering or exiting networks and subnets.
Internet border and internal routers do detect and stop the worm from entering or exiting networks and subnets if the volume of traffic is too high for network firewalls to handle or if certain subnets need greater protection.
The incorrect sequences listed in the other three choices does not contain malware incidents because their combined effect is not as strong and effective as the correct sequence.
131. All the following are characteristics of a managed environment dealing with malware prevention and handling
a. Installing antivirus software
b. Requiring administrator-level privileges to end users
c. Using deny-by-default policies
d. Applying software patches