Eliminating Threats

Submitted by: Submitted by

Views: 10

Words: 264

Pages: 2

Category: Other Topics

Date Submitted: 02/08/2016 11:27 AM

Report This Essay

Assessment Worksheet

Eliminating Threats with a Layered Security Approach

Course Name and Number: _____________________________________________________

JAVIER PRECIADO

Student Name: ________________________________________________________________

KEN ORGILL

Instructor Name: ______________________________________________________________

020816

Lab Due Date: ________________________________________________________________

Overview

In this lab, you used AVG, an antivirus scanning program, to identify malware found on a

compromised system. You also examined the services available on the Windows vWorkstation

machine and disabled an unnecessary service. In addition, you configured the Windows Firewall,

enabled ICMP traffic, and created a new rule for the FileZilla Server application.

Lab Assessment Questions & Answers

1. What is the main difference between a virus and a Trojan?

A USER NEEDS AN INTERACTION OF A USER. A TROJAN MASKS ITSELF AS AN

ACCEPTABLE PROGRAM

2. A virus or malware can impact which of the three tenets of information systems security

(confidentiality, integrity, or availability)? In what way?

COMPROMISE CONFIDENTIAL INFORMATION.

3. Why is it recommended to do an antivirus signature file update before performing an antivirus scan

on your computer?

TO ENSURE YOU HAVE COVERAGE ON THE MOST RECENT MALWARE AND MALICIOUS

SOFTWARE

4. Why might your coworker suggest encrypting an archive file before e-mailing it?

BECAUSE IT WONT BE ABLE TO HARM YOUR COMPUTER.

5. What kind of network traffic can you filter with the Windows Firewall with Advanced Security?

BASED ON ACTIVE DIRECTORY USERS AND GROUP

6. What are typical indicators that your computer system is compromised?

SLOW AND RECEIVEING MANY ADS.

7. What elements are needed in a workstation domain policy regarding use of antivirus and malicious

software prevention tools?

STANDARDIZED CONFIGURATIONS AND SETTINS BASED ON ONRGANIZATION-WIDE

SECURITY POLICY DEFINITION...