Submitted by: Submitted by ademalp
Views: 10
Words: 264
Pages: 2
Category: Other Topics
Date Submitted: 02/08/2016 11:27 AM
Assessment Worksheet
Eliminating Threats with a Layered Security Approach
Course Name and Number: _____________________________________________________
JAVIER PRECIADO
Student Name: ________________________________________________________________
KEN ORGILL
Instructor Name: ______________________________________________________________
020816
Lab Due Date: ________________________________________________________________
Overview
In this lab, you used AVG, an antivirus scanning program, to identify malware found on a
compromised system. You also examined the services available on the Windows vWorkstation
machine and disabled an unnecessary service. In addition, you configured the Windows Firewall,
enabled ICMP traffic, and created a new rule for the FileZilla Server application.
Lab Assessment Questions & Answers
1. What is the main difference between a virus and a Trojan?
A USER NEEDS AN INTERACTION OF A USER. A TROJAN MASKS ITSELF AS AN
ACCEPTABLE PROGRAM
2. A virus or malware can impact which of the three tenets of information systems security
(confidentiality, integrity, or availability)? In what way?
COMPROMISE CONFIDENTIAL INFORMATION.
3. Why is it recommended to do an antivirus signature file update before performing an antivirus scan
on your computer?
TO ENSURE YOU HAVE COVERAGE ON THE MOST RECENT MALWARE AND MALICIOUS
SOFTWARE
4. Why might your coworker suggest encrypting an archive file before e-mailing it?
BECAUSE IT WONT BE ABLE TO HARM YOUR COMPUTER.
5. What kind of network traffic can you filter with the Windows Firewall with Advanced Security?
BASED ON ACTIVE DIRECTORY USERS AND GROUP
6. What are typical indicators that your computer system is compromised?
SLOW AND RECEIVEING MANY ADS.
7. What elements are needed in a workstation domain policy regarding use of antivirus and malicious
software prevention tools?
STANDARDIZED CONFIGURATIONS AND SETTINS BASED ON ONRGANIZATION-WIDE
SECURITY POLICY DEFINITION...