What ports or port types will have unusual activity

Assignment Help Basic Computer Science
Reference no: EM132410344

Scenario: An intern employee names James has found a USB on the ground coming into work, he wants to find the owner. He plugs the USB drive into his workstation computer and the drive appears to be empty. He sees that the command prompt flashes open and closes. Unknowingly he just executed a worm or botnet into the network. He informs you (the CIO) that he believes that he has unleashed a worm.

Task: How would you track, and remove the worm the network?

Areas to consider:

What ports or port types will have unusual activity.

Reference no: EM132410344

Questions Cloud

Devices to connect to the corporate network : You are to create a policy to serve as a governance document that allow employees to bring their own devices to connect to the corporate network,
Risk management tools for food industry : Explore Traditional risk management methods. Explain and define them. Explore Enterprise Risk Management methods. Explain and define them.
Practical manner to your current work environment : How the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.
Explain how the company gather and exploit data : Explain how the company gather and exploit data by giving examples of the appropriate charts. Explain why the charts are appropriate to show each audience.
What ports or port types will have unusual activity : How would you track, and remove the worm the network? What ports or port types will have unusual activity.
State statute which influences commerce : The hyperlink to one state statute which influences commerce on the internet and summarize in not less than 100 words what that statute accomplishes.
Enterprise-wide information governance program : The knowledge needed to make informed decisions on an enterprise-wide Information Governance program for the company.
Articles on the lactose strand in beta galactosidase : I need two separate Research literature reviews from peer reviewed articles on the lactose strand in beta galactosidase.
Cloning and stem cells fact sheet below and handout : Read through the Handout: Cloning and Stem Cells Fact Sheet below and Handout: Stem Cell Wars

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Table designing for new technologies

As technology evolves, Web designers can no longer just assume that all individuals accessing their site are using computers.

  Firm operating under conditions of pure competition

The condition for shutting down the firm is the same for a firm operating under conditions of monopoly as it is for a firm operating under conditions of pure

  Software packages downloaded from online

Suppose you want to verify the integrity of certain files, say system files or software packages downloaded from online. Explain how you can achieve this using MAC andhash functions separately. Also, describe the advantages and disadvantages in us..

  Why is the administrative region above the user region

Prove that any file in the DG/UX system with a link count greater than 1 must have an explicit MAC label.

  Contrast software restriction policies and applocker

From the e-Activity, compare and contrast Software Restriction Policies and AppLocker from an application control function. Suggest two (2) situations that would influence your decision if you were choosing to use either Software Restriction Polic..

  Determining the three-way comparisons

M is an N-by-N matrix in which the entries in each rows are in increasing order and the entries in each column are in increasing order (reading top to bottom). Consider the problem of determining if x is inM using three-way comparisons (i.e., one ..

  Identify the number of days

Identify the number of days

  Create an initial world with four spotlights

When the user clicks on a spotlight, pass the color of the spotlight to the method and make the snowman change to be that color.

  Sensitive to the needs of its customers

As a toy manufacturer, Lego must always be sensitive to the needs of its customers, both children and their parents, which requires the company to pay close attention to changing preferences and trends.

  Certificate of deposit that pays compounded interest

Find the future value of a $195,000 Certificate of Deposit that pays compounded interest every three months at the rate of 8% per year.

  Most effective advanced filtering and search interface

Describe the most effective advanced filtering and search interface. Argue why the interface you chose is more effective than others,

  Transactional and transformational leadership

what is the strength, weaknesses and limitation of transactional and transformational leadership?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd