CompTIA Network+ Question C-23

A company has had several virus infections over the past few months. The infections were caused by vulnerabilities in the application versions that are being used. Which of the following should an administrator implement to prevent future outbreaks?

A. Host-based intrusion detection systems
B. Acceptable use policies
C. Incident response team
D. Patch management

Correct Answer: D

Explanation:
As vulnerabilities are discovered, the vendors of the operating systems or applications often respond by releasing a patch. A patch is designed to correct a known bug or fix a known vulnerability, such as in this case to be vulnerable to virus infections, in a piece of software.
A patch differs from an update, which, in addition to fixing a known bug or vulnerability, adds one or more features to the software being updated.

CompTIA A+ Core 2 Question C-98

Which of the following should a technician do LAST after cleaning up a virus infection?

A. Enable system restore and create restore point
B. Update antivirus software
C. Schedule scans and updates
D. Educate the end user

Correct Answer: D

Explanation:
Most of the time users install virus, Trojans and other malicious codes on their computers unknowingly. The best to prevent this loophole is to educate the user about viruses and where to look and what to do to prevent installing malicious codes.

CompTIA A+ Core 2 Question B-57

A technician is working on a consumer computer that has multiple virus infections. The end user states that all of their data documents are stored on a backup drive. Which of the following methods are commonly available to do a clean install and return the computer back to factory condition? (Select TWO).

A. Upgrade installation disc
B. Repair installation
C. Factory recovery partition
D. OS installation disc
E. Remote network installation

Correct Answer: CD

CompTIA A+ Core 2 Question A-92

A user, Jane, receives a phone call from the company’s mail administrator who indicates her email account has been disabled due to high volumes of emails being sent in a very short period of time. Which of the following types of attack has the user experienced?

A. Virus infection
B. Man-in-the-middle attack
C. Phishing attack
D. Malware infection

Correct Answer: A