127. Organizations should strongly consider rebuilding a system that has which of the following malware incident characteristics?
1.
Unauthorized administrator-level access.2.
Changes to system files.3.
The system is unstable.4.
The extent of damage is unclear.a.
1 onlyb.
2 and 3c.
3 and 4d.
1, 2, 3, and 4128. Which of the following ways should be used to rebuild an infected host with malware incident?
1.
Reinstalling the operating system2.
Reinstalling the application systems3.
Securing the operating and application systems4.
Restoring the data from known good backupsa.
1 and 2b.
3 onlyc.
1, 2, and 3d.
1, 2, 3, and 4129. Lessons learned from major malware incidents improve which of the following?
1.
Security policy2.
Software configurations3.
Malware prevention software deployments4.
Malware detection software deploymentsa.
1 onlyb.
1 and 2c.
3 and 4d.
1, 2, 3, and 4130. Which of the following is the correct tool and technology deployment sequence for containing malware incidents, especially when a worm attacks the network service?
1.
Internet border and internal routers2.
Network-based firewalls3.
Network- and host-based antivirus software4.
Host-based firewallsa.
1, 2, 4, and 3b.
2, 3, 1, and 4c.
3, 4, 2, and 1d.
4, 2, 1, and 3Network- and host-based antivirus software does detect and stop the worm, and identify and clean the infected systems.
Host-based firewalls do block worm activity from entering or exiting hosts, reconfigure the host-based firewall itself to prevent exploitation by the worm, and update the host-based firewall software so that it is no longer exploitable.
Network-based firewalls do detect and stop the worm from entering or exiting networks and subnets.
Internet border and internal routers do detect and stop the worm from entering or exiting networks and subnets if the volume of traffic is too high for network firewalls to handle or if certain subnets need greater protection.
The incorrect sequences listed in the other three choices does not contain malware incidents because their combined effect is not as strong and effective as the correct sequence.
131. All the following are characteristics of a managed environment dealing with malware prevention and handling
a.
Installing antivirus softwareb.
Requiring administrator-level privileges to end usersc.
Using deny-by-default policiesd.
Applying software patches