Podcast
Questions and Answers
What are the three approaches mentioned in the text to find malware and hackers in our system?
What are the three approaches mentioned in the text to find malware and hackers in our system?
- Hard drive, memory, registry
- Online, offline, hybrid (correct)
- Active, passive, clone
- Manual, automatic, snapshot
Which approach involves removing the hard drive containing the system files to scan for malware?
Which approach involves removing the hard drive containing the system files to scan for malware?
- Offline approach (correct)
- Automatic approach
- Online approach
- Hybrid approach
In which approach is the malware or malicious code active and running?
In which approach is the malware or malicious code active and running?
- Automatic approach
- Hybrid approach
- Offline approach
- Online approach (correct)
What can be used to check the running programs, certificates, and underlying processes for malware?
What can be used to check the running programs, certificates, and underlying processes for malware?
Which program can be used as a reference point to compare system files and registry when removing malware manually?
Which program can be used as a reference point to compare system files and registry when removing malware manually?
What is one challenge mentioned when trying to remove malware/malicious code manually?
What is one challenge mentioned when trying to remove malware/malicious code manually?