Free Essay

Lab 3 Questions

In: Computers and Technology

Submitted By pnoyz
Words 579
Pages 3
Removing Malware: Tools and Techniques
Devan A. Dunham
American Military University, ISSC342, Instructor Peter Mylonakos

In the digital world, there are many tools and techniques to harm your computer, but there are also the same for protecting your computer as well. Malware, or malicious software, is software that is intended to damage or disable computers and computer systems. It is very dynamic and can be hard to detect sometimes because it may disguise itself as something that should be running on your computer. For example, after installing a program, Jim doesn’t realize that the executable file he downloaded was infected with malware named “Wajam” but disguised itself as “Software Updater” under Control Panel. It ran in the background and updated itself automatically without Jim’s knowledge. So how would Jim detect and remove this virus? First, Jim should always be aware what is running on his computer. On Windows machines specifically, opening the Task Manager and taking a quick look at processes will give the user a good outlook on what is running on the computer. Users should look for anything suspicious or unknown processes and do further research upon discovering them. Another simplified way to discover malware is to use an anti-virus program. There are many available to users and doing a quick internet search will yield thousands of programs, but sticking with reputable programs will serve its purposes. Scanning for malware and other viruses is as simple as click and wait. The program scans all system files and notifies the user upon completion and detection. After discovery of malware, how would users ensure complete removal of software? Detecting malware is the first step of the removal process. Summarizing Spector’s methods (2013), whether it be manually or with help from an anti-virus protection, a user needs to know how to detect malicious software. After detection, there are two common ways to remove the malware. The first method is removing it manually. If you know the name of the malware or any program aliases that it may be disguised as (such as the aforementioned “Software Updater”), then the user can simply go to Control Panel > Uninstall A Program, select the malicious software and uninstall that program. After removing the program, users should double-check the program list again and remove any unknown or unused programs. Any sure signs of the malware, such as pop-ups or unsolicited notifications should stop after removal. The second, most common method is using an anti-virus program to scan all system files. This usually takes time, but will ensure complete detection of most viruses and malware. After the scan is done, the anti-virus program will usually notify of how many system files were scanned, the number of malicious files discovered and where the malicious files are hiding. To remove the files, the anti-virus program will normally ask the user to automatically remove all malicious files. It’s that simple to use. Just click to scan, wait for the scan to finish, then click to remove all files. Like in the first method, any sure signs of the malware will cease to exist. If using an anti-virus program, users should make it a habit to scan periodically in order to ensure complete protection from malicious software.

References
Spector, L. (2013). When malware strikes: How to clean an infected PC | PCWorld. Retrieved from http://www.pcworld.com/article/2039995/when-malware-strikes-how-to-clean-an-infected-pc.html

Similar Documents

Premium Essay

Lab 3 Questions and Answers

...Lab #3: Worksheet Configure Windows File System Permissions Student Name: _____________________________________________________________ Lab Due Date: April 10, 2015 If you may work in groups to complete this lab. Folder Structure Drawing You are asked to draw a folder structure that meets the scenario’s requirements. You may draw the structure on paper, use Visio or another drawing program. If you draw the structure on a separate sheet of paper, turn this in to your instructor. If you use Visio or another drawing program, paste your diagram here: Screenshots The lab requires the student to provide several screen captures at specific points in the process. Place your screen captures here in the appropriate order. Assessment Questions Overview In this lab, you reviewed a scenario requiring you to design a Windows folder structure, and you implemented your design. Next, you used the Microsoft® Active Directory Users and Computers utility to create security groups that suited the requirements in the scenario. Finally, you applied those security groups to the folder structure you designed. Questions 1. When you designed a file system in the first section of this lab, why did you choose the structure that you selected? a. What I learned how to do in the associates program 2. As you look back on the file structure that you created, what changes would you want to make if you were to use it for a real college environment? b. Make sure OU stay together 3. In...

Words: 350 - Pages: 2

Premium Essay

Lab 3 Assessment Questions Is3350

...CardSystems Solutions break any federal or state laws? • Federal Trade Commission presented a decision order on CardSystems Solutions and its predecessors as a result of negligence and violation of FTC Act 15, U.S.C. 41-58. 2. CardSystems Solutions claim to have a hired an auditor to assess compliance with PCI DSS and other best practices for ensuring the C-I-A of privacy data for credit card transaction processing. Assuming the auditor did indeed perform a PCI DSS security compliance assessment, what is your assessment of the auditor’s findings? • If compliant they would have implemented proper IP s firewalls or maintained their anti-virus program definitions. Also they were required to encrypt all stored sensitive privacy data for research. 3. Can CardSystems sue the auditor for not performing his or her tasks and deliverables with accuracy? Do you recommend that CardSystems Solutions pursue this avenue? • No because they were PCI DSS compliant in 2004 but was not certifiably compliant at the time of attack in June of 2005. 4. Who do you think is negligent in this case study and why? • CardSystems. Given their high profile, they were expected to be in compliance for properly storing and protecting all privacy data including gathered transactions and credit card information of their cliental in an encrypted manner. 5. Do the actions of the CardSystems warrant an “unfair trade practice” designation as stated by the Federal Trade Commission (FTC)? • Yes, because the cliental...

Words: 649 - Pages: 3

Free Essay

Network

...following exercises and questions from Routers and Routing Basics: CCNA 3 Labs and Study Guide: Vocabulary Exercise: Matching on page 3 VLSM Subnetting a Subnet Exercises on pages 9-11 VLSM Addressing Design Scenarios 1-6 on pages 15-20 Summary Route Exercises on pages 21-24 Concept Questions on pages 25-27 VLSM Case Study on page 27 Internet Research on page 29 (Use the ITT Tech Virtual Library.) • Complete Chapter 9 Review Questions 2-7, 10, 14, 20-22 on pages 258-259 of Introduction to Telecommunications. Submit your written answers to your instructor at the beginning of Unit 2. . Assignment 1.2: Virtual Labs • Complete Virtual Labs 6, 7, and 8 from the CCNA 640-802 CCNA Simulator, which you can find by clicking through these paths: ICND1 Troubleshooting Scenarios Lab 6: IP Addressing and Routing. ICND1 Troubleshooting Scenarios ICND1 Part 4: Troubleshooting Labs Lab 7: IP Routing I ICND 2 Troubleshooting Scenarios Lab 13: IP Routing II Submit your written answers to your instructor at the beginning of Unit 2. ©ITT Educational Services, Inc: Date: 03/13/09 Network Technology and Service Integration Unit 2 Homework The following homework is designed to cover the course objectives for this unit. Assignment 2.1: Textbook/Workbook Assignments • Complete the following exercises and questions from Routers and Routing Basics: CCNA 3 Labs and Study Guide: Vocabulary Exercise: Matching on page 70 Vocabulary Exercise: Completion on page 71 Concept Questions on page 72 Build the SPF...

Words: 2825 - Pages: 12

Free Essay

Cis 206 Ilab 5 Using the Vim Editor

...(http://hwguiders.com/ ) Lab #: 5 Lab Title: Using the Vim Editor Student Name: Date: Prepare this Lab Report when you have completed and lab assignment. Include any charts, graphs required to complete the lab. Refer to your initial lab plan to respond to the first questions. 1. Define the problem you were solving in this lab. (If any) This weeks iLab was instructing us on how to create files, enter and edit lines of text, search for text strings, replace text strings, and create a script file to work with directories and files. 2. What challenges did you meet in working towards completing the Lab? One challenge I faced was in Step 4. I was instructed in the video tutorial to Highlight the text “Hello World” and press the ‘N’ key to make that text highlighted. When I pressed ‘N’ I received a “Pattern Not Found: 640” error message. This is shown in the third Screenshot of Step 4 pasted below. I also initially had trouble with Step 6 Part A, changing “bit” to “five”. 3. Were you successful in solving the problem? Did you use methods you learned in class? If yes, explain your solution, if no, explain the solution you did use. Please be specific, and provide a detailed description of your solution. For Step 4 I did not see this instruction in Activity 6-3 of our book, so I just skipped it for the time being. For Step 6 Part A, I realized my cursor wasn’t on the first line. J 4. What questions related to this lab still remain for you? I suppose...

Words: 5180 - Pages: 21

Premium Essay

Common Lab Tasks

...Common Lab Tasks In each lab, you will follow a series of step-by-step instructions designed to help you explore the environment and gather the information you need to successfully complete the deliverables. In each lab, you will perform identical steps, such as opening the virtual lab, logging in to another server, taking screen captures, and transferring files to your local computer. To avoid repeating steps in the lab itself, those common steps have been collected in this file. You may refer to this document at any time during your lab session. Though you may not be required to perform each of these steps in every lab, the Common Lab Steps are listed in the order that you are most likely to encounter them. As you review this list, you should pay attention to the logic and flow of the lab. This will help you to perform the lab procedures more quickly and more accurately. Note: The other virtual machines used in this environment may require as long as 10 minutes to complete their initialization processes (wake-up sequences) and load all required software. If you receive a connection error message, wait at least one minute before clicking on the Remote Desktop Connection icon to retry the connection. Virtual Lab Environment You will use the virtual lab environment to complete the learning activities in this lab manual. Note: The virtual lab environment, also called the Virtual Security Cloud Lab (VSCL) requires Java, Adobe Flash, and a compatible Web browser. The list...

Words: 2387 - Pages: 10

Premium Essay

Work in Progress

...CSEC630 Week 3 **When working this and the remaining portion of the course, it is best to do everything and look again and do everything before submission.) Instructions and Grading Criteria for Lab Assignment #1 Assignment instructions for the written report appear with the grading criteria below. The questions that must be addressed in the report and instructions for the lab portion of the assignment are attached to this assignment. Note: there are two parts to this lab, each part contains 4 questions for you to answer. The CSEC630 Lab 1 PDF attached document includes an introduction section to CrypTool. Lab part 1 starts on page 11 and Lab part 2 starts on page 17. Please submit a Word document that contains your answers to all 8 questions to Lab1 Assignment for Week 3. Objective: The objective of the lab session is for the student to explore cryptography in action by using the educational CrypTool. Competencies: Technology fluency, critical thinking Instructions: For this lab assignment, each student completes the lab exercise using the CrypTool software and prepares a report addressing the questions included in the lab assignment instructions attached to this topic. Submit your answers in the Assignment folder. This assignment is due at the end of the session week 3. Note: You are not required to turn this assignment to Turnitin.com. Grading Criteria This assignment is worth 10 percent of your total grade. • Your score for this assignment...

Words: 400 - Pages: 2

Free Essay

Ch 220c

...CH 220C ORGANIC CHEMISTRY LABORATORY Spring, 2015 Section Page 1. General Information 2 2. Safety Information 2 3. Attendance 3 Make-Up Policy 3 4. Laboratory Protocol 3 Assigned Reading 3 Pre-Lab Quizzes 3 Lab Notebook 5 Chemicals 5 Due Dates for Reports 5 5. Orientation 5 In-Lab Information 5 Library Information 5 6. Check-In 6 7. Grading Procedure 6 8. Policy on Cheating 7 9. TA Office Hours 8 10. Faculty Course CoordinatorS 8 11. Course Web Page 8 12. Hints to Minimize Frustration IN ORGANIC CHEMISTRY 8 13. Work Schedule 10 Lab Report Due Date Schedule 10 Experiments 10 14. Supplements 17 A. Extraction of Unknown 17 B. Recrystallization of Unknown Products 18 C. Methyl Benzoate 19 D. Synthesis of Luminol 20 E. Azo Violet 23 1. GENERAL INFORMATION PRE- and CO-REQUISITES Pre- and co-requisites for CH 220C listed in the Course Schedule. Important: Because the lecture and laboratory courses are co-requisites of each other, dropping one of them requires that you drop the other as well, unless the drop occurs during ...

Words: 8040 - Pages: 33

Free Essay

Deploying a Ftp Server

...Lab 4-1 70-643 worksheet Deploying an FTP Server This lab contains the following exercises: Exercise 4-1-1 Installing the Web Server (IIS) Role Exercise 4-1-2 Creating an FTP6 Site Exercise 4-1-3 Configuring FTP6 Security Lab Review: Questions Lab Challenge: Creating a Combined Web/FTP Site Estimated lab time: 55 minutes BEFORE YOU BEGIN The classroom network consists of Windows Server 2008 student server A and B a connected to via an internal local area network. NT2670Srv##A the domain controller for the contoso##.com domain, is running Windows Server 2008. Throughout the labs in this manual, you will install, configure, maintain, and troubleshoot application roles, features, and services on the NT2670Srv##A. To accommodate various types of classroom arrangements, each lab in this manual assumes that the student servers are in their baseline configuration, as described in Lab 1-2, “Preparing an Application Server.” If you have not done so already, complete the initial configuration tasks in Lab 1-2-1 before beginning this lab. Your instructor should have supplied the information needed to complete the following table: Student computer name (NT2670Srv##A) | | Student account name (Student##) | | To complete the exercises in this lab, you must access a second student computer on the classroom network, referred to in the exercises as your partner server. Depending on the network configuration, use one of the following options, as directed by your instructor: ...

Words: 964 - Pages: 4

Premium Essay

Csec 630

...CSEC630 Week 3 Instructions and Grading Criteria for Lab Assignment #1 Assignment instructions for the written report appear with the grading criteria below. The questions that must be addressed in the report and instructions for the lab portion of the assignment are attached to this assignment. Note: there are two parts to this lab, each part contains 4 questions for you to answer. The CSEC630 Lab 1 PDF attached document includes an introduction section to CrypTool. Lab part 1 starts on page 11 and Lab part 2 starts on page 17. Please submit a Word document that contains your answers to all 8 questions to Lab1 Assignment for Week 3. Objective: The objective of the lab session is for the student to explore cryptography in action by using the educational CrypTool. Competencies: Technology fluency, critical thinking Instructions: For this lab assignment, each student completes the lab exercise using the CrypTool software and prepares a report addressing the questions included in the lab assignment instructions attached to this topic. Submit your answers in the Assignment folder. This assignment is due at the end of the session week 3. Note: You are not required to turn this assignment to Turnitin.com. Grading Criteria This assignment is worth 10 percent of your total grade. • Your score for this assignment can range from 0-100 percent. There are eight questions. • full credit- The answer is thoroughly developed and clearly stated. It represents...

Words: 376 - Pages: 2

Premium Essay

Common Lab Tasks

...Common Lab Tasks In each lab, you will follow a series of step-by-step instructions designed to help you explore the environment and gather the information you need to successfully complete the deliverables. In each lab, you will perform identical steps, such as opening the virtual lab, logging in to another server, taking screen captures, and transferring files to your local computer. To avoid repeating steps in the lab itself, those common steps have been collected in this file. You may refer to this document at any time during your lab session. Though you may not be required to perform each of these steps in every lab, the Common Lab Steps are listed in the order that you are most likely to encounter them. As you review this list, you should pay attention to the logic and flow of the lab. This will help you to perform the lab procedures more quickly and more accurately. Note: The other virtual machines used in this environment may require as long as 10 minutes to complete their initialization processes (wake-up sequences) and load all required software. If you receive a connection error message, wait at least one minute before clicking on the Remote Desktop Connection icon to retry the connection. Virtual Lab Environment You will use the virtual lab environment to complete the learning activities in this lab manual. Note: The virtual lab environment, also called the Virtual Security Cloud Lab (VSCL) requires Java, Adobe Flash, and a compatible Web browser. The list...

Words: 2388 - Pages: 10

Premium Essay

Troubleshooting Intervlan Routing and Host Configuration Issues

...Lab Title Configure and verify interVLAN routing using a router on a stick Your Name: Cruz Galvan DSI Number: D40495378 NETW204 DeVry University Date: 20160123 Professor Name: Mario Kosseifi Table of Contents Introduction 3 Procedure 3 Results 3 Application and Analysis 3 Questions 3 Conclusion and Recommendation 4 Lessons Learned 4 References 4 Introduction Discuss what you will do in this lab. Provide some background information on the main idea in this lab and discuss the purpose of the lab activity. We will be troubleshooting interVLAN routing and host configuration issues. From reading through this lab I will be using my troubleshooting skills and knowledge I have learned so far to fix some of the problems that are occurring in this network. Procedure How did you go about implementing the lab activity? Describe the steps you took to ensure that the final implementation meets the original business goal. For example, did you design a new IP scheme and assign IP addresses to devices based on a given range of IP addresses? Did you assign IP addresses manually, dynamically, or both? Did you name devices based on location? Did you or would you connect switches first or routers first, why? Did you configure the end devices or the infrastructure devices first? What was the plan to verify that the network work? Note that the procedure must take into consideration not only the steps you took to implement the lab solution but also the...

Words: 671 - Pages: 3

Free Essay

Cis 206 Ilab 4 Working with Directories

...(http://hwguiders.com/ ) CIS 206 iLab 4 Working With Directories Lab Title: Working with Directories Student Name: Date: Prepare this Lab Report when you have completed and lab assignment. Include any charts, graphs required to complete the lab. Refer to your initial lab plan to respond to the first questions. 1. Define the problem you were solving in this lab. (If any) This weeks lab was to familiarize ourselves with the Linux directory structure by creating, moving, and deleting files and directories using the “vim Editor.” 2. What challenges did you meet in working towards completing the Lab? The instructions were straight forward. I just had to look a few times, since we were asked to skip several instructions to focus on the main parts of the tutorial in our book assignment. [Side Note]: Many students seemed to have problem accessing the Lab for this week. I did not seem to have any troubles loading the Lab Mentor, unless the internal issue was hotfixed. 3. Were you successful in solving the problem? Did you use methods you learned in class? If yes, explain your solution, if no, explain the solution you did use. Please be specific, and provide a detailed description of your solution. I just kept the iLab assignment and book assignment side-by-side as I was reading through the instructions. The main task was multitasking several windows at the same time (i.e., iLab instructions, OS Book, Lab Mentors, Word 2010). TO Download Complete Tutorial With...

Words: 2827 - Pages: 12

Premium Essay

Unit 1 Labs

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are...

Words: 16182 - Pages: 65

Premium Essay

Police Abuse Essay

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the...

Words: 16043 - Pages: 65

Premium Essay

Nt2640

...hours: 4.5 Contact /Instructional hours: 34 Theory, 22 Lab Prerequisite: NT1210 Introduction to Networking or equivalent Course Revision Table Change Date Updated Section Change Description Change Rationale Implementation Quarter 07/18/2011 All New Curriculum New Curriculum September 2011 02/19/2013 All Updated labs across the course to map the 2nd edition of lab manual Immediately 02/27/2013 Midterm and Final Examination Answer Keys Added examination keys Immediately 03/18/2013 Answer Keys for Midterm and Final Updated some answers to address the accuracy March 2013 04/19/2013 Assignment labels on Pages 43, 52, 61, 78, 87, 97, 106 and 132. Added labels to identify additional assignments in affected units Clarification of additional assignments March 2013 Table of Contents COURSE OVERVIEW 5 Catalog Description 5 Goals and Expectations 5 Learning Objectives and Outcomes 6 Career Impact 6 INSTRUCTIONAL RESOURCES 7 Required Resources 7 Additional Resources 7 COURSE MANAGEMENT 9 Technical Requirements 9 Test Administration and Processing 9 Replacement of Learning Assignments 10 Communication and Student Support 10 Academic Integrity 10 GRADING 11 COURSE DELIVERY 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 UNIT PLANS 15 Unit 1: The TCP/IP Model, LANs, WANs, and IP Networks 15 Unit 2: TCP/IP Network, Transport, and Application Layers 24 Unit 3: IP Subnetting and Basic Router Configuration 34 Unit 4: IP...

Words: 22068 - Pages: 89