Reference no: EM131188413
Lab: Eliminating Threats with a Layered Security Approach
Overview
In this lab, you used AVG, an antivirus scanning program, to identify malware found on a compromised system. You also examined the services available on the Windows vWorkstation machine and disabled an unnecessary service. In addition, you configured the Windows Firewall, enabled ICMP traffic, and created a new rule for the FileZilla Server application.
Lab Assessment Questions & Answers
1. What is the main difference between a virus and a Trojan?
2. A virus or malware can impact which of the three tenets of information systems security (confidentiality, integrity, or availability)? In what way?
3. Why is it recommended to do an antivirus signature file update before performing an antivirus scan on your computer?
4. Why might your coworker suggest encrypting an archive file before e-mailing it?
5. What kind of network traffic can you filter with the Windows Firewall with Advanced Security?
6. What are typical indicators that your computer system is compromised?
7. What elements are needed in a workstation domain policy regarding use of antivirus and malicious software prevention tools?
Numerical risk analysis for full points
: Provide an analysis of a company's risk tolerance and risk exposure. Include the impact this tolerance and exposure may have on potential outcomes. Be sure to include a numerical risk analysis for full points. The numerical portion can be as simpl..
|
How did you select the companies for your portfolios
: How did you select the companies for your portfolios? You don't have to give a list of every company and why, it should be in general. The detail should be in the appendix. You need to make reference to the technical theories you have used and jus..
|
What is the frequency of the allele for cystic fibrosis
: Cystic fibrosis is an autosomal recessive condition. The frequency of cystic fibrosis is 0.000484, or about 1 in 2000 people.?What is the frequency of the allele for cystic fibrosis? What percent of people are carriers (heterozygous) for cystic fi..
|
What were the fun activities
: With a group of four or five students, discuss your most recent work experiences in light of whether the employer tried to consciously introduce some fun workplace activities. What were the fun activities? Did they work?
|
What are indicators that your computer system is compromised
: What are typical indicators that your computer system is compromised? A virus or malware can impact which of the three tenets of information systems security (confidentiality, integrity, or availability)? In what way?
|
Using the step-down method to allocate costs
: St. Payne Med Center is using the step-down method to allocate costs. They have two support departments (Record Keeping and Cleaning), and two patient service departments (Eye Care and Dental Care). Some of the Record Keeping costs are allocated to C..
|
Availability of funding assistance from other countries
: Explore the World Fact Book page of Central Intelligence Agency website at https://www.cia.gov/library/publications/the-world-factbook/. Select two countries from among those represented on the global map on the webpage. Hovering over the map with..
|
What was the firms net income
: During the year, the Senbet Discount Tire Company had gross sales of $1.25 million. The firm’s cost of goods sold and selling expenses were $544,000 and $234,000, respectively. The firm also had notes payable of $990,000. What was the firm’s net inco..
|
Write an informative speech on basketball
: What would be a good (Purpose statement, Attention getter, Thesis statement and First main point/argument) to get me started on it.
|