Reference no: EM131521547
Assessment Worksheet
Identifying and Removing Malware from Windows Systems
Overview
In this lab, you used AVG Business Edition, an antivirus and anti-malware software tool, to identify malware and malicious software from an infected Windows 2012 workstation. You researched remediations for the malware identified by the scan, and took actions to remove those programs. You also used Windows Defender to perform the same actions on a Windows 2008 workstation.
Lab Assessment Questions & Answers
1. What is the one thing that a virus, a worm, spyware, and malicious code have in common? What are the differences among these three threats: a virus, a worm, and spyware?
2. How often should you update your antivirus protection?
3. Why is it a best practice to have and to carry an antivirus boot-up disk or CD?
4. In a corporate environment, should new antivirus definitions be installed as soon as they are available?
5. Is the manual quick scan good enough protection for a system?
6. What best practices for the workstation domain that can mitigate the risks and threats caused by malicious code?
7. If you have an up-to-date antivirus program, do you still need a malware detection program like Windows Defender?
8. What are some of the most common symptoms of malware?
9. What risk or threat do malware applications, such as spyware, pose to the workstation domain?
Record the advance collection of million in ticket sales
: The University of Michigan football stadium, built in 1927, is the largest college stadium in America, with a seating capacity of 107,500 fans.
|
How the information gap between generations and cultures
: Discuss how the information gap between generations, cultures, income levels, and education can be resolved.
|
What was the recovery key generated by bitlocker in this lab
: Within a Microsoft Windows Server 2012 environment, who has access rights to the EFS features and functions in the server?
|
Determine the balance in the unearned revenue account
: Texas Roadhouse opened a new restaurant in October. During its first three months of operation, the restaurant sold gift cards in various amounts totaling.
|
How often should you update your antivirus protection
: What is the one thing that a virus, a worm, spyware, and malicious code have in common? What are the differences among these three threats.
|
Write an outline of the business plan to be developed
: Write an outline of the business plan to be developed for ToolsCorp's strategic initiative and Key operating principles as you will apply them.
|
What are some of the best practices to enhance the strength
: Relate how Windows Server 2012 Active Directory and the configuration of access controls achieve C-I-A for departmental LANs, departmental folders, and data.
|
Record any amounts as a result of each contingencies
: The ink-jet printing division of Environmental Printing has grown tremendously in recent years. Assume the following transactions related to the ink-jet.
|
Evaluate the success of the tactics described
: Evaluate the success of the tactics described. Discuss what might have been done to make the tactic even more successful.
|