Which other items may be deleted when deleting a malicious file from an endpoint?
A.
Registry entries that point to that file
B.
The incident related to the file
C.
SEP Policies related to that file
D.
Files and libraries that point to that file
The Answer Is:
A
This question includes an explanation.
Explanation:
When amalicious fileis deleted from an endpoint,registry entries that point to that filemay also be deleted as part of the remediation process. Removing associated registry entries helps ensure that remnants of the malicious file do not remain in the system, which could otherwise allow the malware to persist or trigger errors if the system attempts to access the deleted file.
Why Registry Entries are Deleted:
Malicious software often creates registry entries to establish persistence on an endpoint. Deleting these entries as part of the file removal process prevents potential reinfection and removes any references to the deleted file, which aids in full remediation.
Why Other Options Are Incorrect:
Incidents related to the file(Option B) are tracked separately and typically remain in logs for historical reference.
SEP Policies(Option C) are not associated with specific files and thus are unaffected by file deletion.
Files and libraries that point to the file(Option D) are not automatically deleted; only direct registry entries related to the file are addressed.
References: Deleting registry entries associated with malicious files is a standard practice in endpoint protection to ensure comprehensive threat removal​.
250-580 PDF/Engine
Printable Format
Value of Money
100% Pass Assurance
Verified Answers
Researched by Industry Experts
Based on Real Exams Scenarios
100% Real Questions
Get 65% Discount on All Products,
Use Coupon: "ac4s65"