Premium Essay

Lab# 6

In: Computers and Technology

Submitted By paradamiguel9
Words 291
Pages 2
Lab #6 – Assessment Worksheet Identifying and Removing Malware on a Windows System
Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you used AVG AntiVirus Business Edition to identify the viruses, worms, Trojans, malware, or other malicious software found on a compromised Windows machine. You completed a scan of the entire computer, learned how to exclude folders to avoid false positives, and understood the importance of maintaining the signatures database. You discovered the difference between a full computer scan and a Resident Shield scan. Finally, you also permanently removed the malware identified by the antivirus software and scheduled the scan to run automatically. Lab Assessment Questions & Answers
1. Why is it recommended to update the antivirus software’s signature database before performing an antivirus scan on your computer? updating the antivirus software with the latest virus definitions ensures the software has the latest information to identify and quarantine threats.

2. What are typical indicators that your computer system is compromised? slow response opening, operating system not booting up correctly or no functioning normally, event logs reporting numerous unusual alerts.

3. Where does AVG AntiVirus Business Edition place viruses, Trojans, worms, and other malicious software when it finds them?
It places the virus in a Virus Vault which is a quarantine area where all removed files, viruses go.

.

4. What other viruses, Trojans, worms, or malicious software were identified and quarantined by AVG within the Virus Vault?
Exploit, trojan horse dropper...

Similar Documents

Premium Essay

Lab 6

...Unit 6 Lab 6.1: Pseudocode Learning Objectives and Outcomes Use Boolean variables and logical operators in computer programs. Use compound logical conditions. Required Setup and Tools Standard lab setup Lab Manual Lab Demo Media and Startup Files CD Recommended Procedures Complete Lab 6.1: Pseudocode from the lab manual. Deliverables Submit the following at the end of this lab activity: The completed inputOptions() module in pseudocode in Step 1 The completed displayProvider() module with a case structure in pseudocode in Step 2 The completed and workable algorithm with nested If-Else statements using logical operators in Step 3 Unit 6 Lab 6.2: Flowcharts Learning Objectives and Outcomes Use flowcharts and pseudocode to represent Boolean conditions. Use if-then, if-then-else, and case structures in a computer program. Use Boolean variables and logical operators in computer programs. Use compound logical conditions. Required Setup and Tools Standard lab setup Lab Manual Lab Demo Media and Startup Files CD Recommended Procedures Complete Lab 6.2: Flowcharts from the lab manual. Deliverables Submit the following at the end of this lab activity: Corrected variable declarations and initializations using Visio in Step 2 Corrected module calls using Visio in Step 3 Corrected inputOptions() module using Visio in Step 4 Corrected displayProvider() module with case labels and flow lines using Visio in Step 5 Corrected displayChoices() module with......

Words: 355 - Pages: 2

Free Essay

Lab 6

...University of West Florida Electrical and Computer Engineering Digital Logic and Computer Systems EEL 3701L Lab 6: BCD to Seven Segment Display Decoder Due: November 3, 2014 Meghan Szatkowski, Brandon Burrows, Michael Long Abstract: For this lab we were to create a circuit that displays decimal numbers from binary numbers since most humans are not capable of reading binary. Using a 7-segment display we are able to achieve that by converting the BCD value into a 7 bit output. The 7-segment display has 7 LEDs and a certain amount of voltage triggers each of the 7 segments to produce a decimal number. Procedure 1. Create a truth table for your 4 bit input and the corresponding output necessary to light the proper segments of the display. For example, if the input is represented by WXYZ and the output is identified as ABCDEFG then if the input is 0000, all outer LEDs should be lit while the middle LED should be off. Once you create the rows in a truth table for the other 9 combinations, find the function for each segment. 2. Depending on whether you are dealing with more 0s or 1s, choose NAND or AND gates to implement each segment function. 3. Wire the input DIP switches to the decoder input. Note that you have 2 3x8 decoders. You will need to use the inputs and enable lines to combine them in order to implement these 7 functions. 4. Wire the NAND or AND gates to the proper outputs of the decoders in order to implement the functions for each......

Words: 1151 - Pages: 5

Premium Essay

Lab 6

...Assessment Worksheet 91 LaB #6 – aSSESSmENt WORKSHEEt Perform Business Continuity Implementation Planning Course Name and Number: Student Name: Instructor Name: lab due date: 6 Perform Business Continuity Implementation Planning Overview In this lab, you were asked to begin the business continuity planning process for an e-commerce company, Online Goodies. You reviewed the key business functions and a prioritized list of impacted IT systems, applications, and data provided by your supervisor. You also compared the components of the major documentation required by the business continuity planning process: risk analysis, business impact analysis, business continuity plan, disaster recovery plan, and the business continuity implementation plan. Lab Assessment Questions & Answers 1. What is the difference between a risk analysis (RA) and a business impact analysis (BIA)? Risk analysis is often identifying the potential threats and the associated vulnerabilities to the organizations .Risk analysis doesn’t view the organization from the mission critical Business Process point of view. BIA the organization from the impact that is going to occur for an organization if the critical business processes are interrupted or tampered 2. What is the difference between a disaster recovery plan (DRP) and a business continuity plan (BCP)? Disaster recovery plan is have a full access to recover any lost data or essentials after a disaster while the business......

Words: 681 - Pages: 3

Free Essay

Lab 6

...Category | Points | Description | Section 1Configuring OSPF Single Area: 40 Points * Task 1: Step 5 * Related Explanation or Response * Task 1: Step 6 * Related Explanation or Response * Task 1: Step 10 * Related Explanation or Response * Task 2: Step 4 * Related Explanation or Response * Summary Paragraph | 2323232320 | Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.In your own words, summarize what you have learned about IP subnetting and configuration. | Total | 40 | | ------------------------------------------------- Name: Barry Bird Date:4/17/14 Professor: Mohammad Kasraian ------------------------------------------------- Configuring OSPF Single Area vLab (30 points) Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCOs and other course material, and (just as important) how you feel it will benefit you in your academic and professional career. (10 points) In this Ilab we learned how to Configuring OSPF setting in a router simulated environment. We learned the commands that must be used to properly install these settings. We learned how to create a designated router and a backup......

Words: 506 - Pages: 3

Premium Essay

Lab 6

...1. Why are spindle fibers important for mitosis? (5 points) Chromosomes use spindle fibers as pathways to daughter cells during mitosis. 2. State the four bases that make up DNA. (4 points) a. Adenine b. Guanine c. Thymine d. Cytosine 3. What are the two base pairs? (2 points) a. T & C b. A & G 4. Answer the following questions: a. Define the term crossing over. (3 points) During meiosis’ prophase the homologous chromatids exchange segments. b. Explain why crossing over is important in meiosis. (3 points) Parents cell use it to pass genes off to their children cells. 5. What are the two main differences between mitosis and meiosis? (4 points) a. The amount of cell divisions b. The genes that are exchanged between chromosomes 6. Answer the following questions: a. Explain the difference between mitosis and cytokinesis. (3 points) Cytokinesis is running one cell into two cells. Mitosis is a nuclear division that causes the separation of chromosomes. b. When does mitosis occur during the cell cycle? (1 point) During the prophase, metaphase, anaphase, and telophase. c. When does cytokinesis occur during the cell cycle? (1 point) The telophase 7. Explain the differences that occur during cytokinesis of plant and animal cells. (5 points) The animal cell membrane is drawn inward until the cytoplasm is divided into two equal parts. In plant cells, cytoplasm is divided by the formation of a cell plate that extends until the two daughter cells become......

Words: 821 - Pages: 4

Premium Essay

Lab 6

...Lab Assessment Questions & Answers 1. What is the difference between roles and features in Windows Server 2008? A server role is a set of software programs that lets a computer perform a specific function for multiple users or other computers within a network. Features are software programs that can support or increase the functionality of one or more roles, or improve the functionality of the server, regardless of which roles are installed. 2. What is installed when you choose the Windows Server Backup Feature? Windows Server Backup Microsoft Management Console (MMC) snap-in. 3. How often should servers be backed up? It is recommended to do them frequently. About every 90 days should be fine. 4. What are the different types of backup that are performed in servers? Copy Backup, Daily Backup, Differential Backup, Incremental Backup, Normal Backup. 5. What are the primary purposes of backing up a server? Recover information after it is lost. 6. Besides performing and scheduling changes, what else can you do in the Windows XP Backup and Restore program? In the Backup you can backup everything on the computer, selected files, drives, or network data, only backup the System State data. In the Restore you can only restore from a backup file. 7. Can you restore a server’s operating system image using the restore application? Yes, by using Windows Recovery Environment and a backup that you created earlier with Windows Server Backup. 8. What are the options to......

Words: 304 - Pages: 2

Premium Essay

Lab 6

...Chapter 6 Assessment Questions 1. In terms of business continuity, a hostage situation could be considered a disaster. True 2. _____ is choosing not to engage in an activity that carries some element of risk. Risk avoidance 3. _____ is carrying on despite the risks involved in a given activity. Risk acceptance 4. _____ is the process of assigning risk to someone else. Risk transference 5. _____ combines attempts to minimize the probability and impact of risk. Risk mitigation 6. The three main threat categories are information confidentiality, _____, and availability. Integrity 7. Even non-sensitive data should be kept under some level of access control. True 8. Any system or data resource that, if it were lost, stolen, damaged, altered, or publicly divulged, would cause a significant negative impact to the organization should be considered _____. Sensitive 9. Which of the following is an access control system in which rights are assigned by the owner of the resource? Discretionary access control 10. Which of the following is an access control system in which rights are assigned based on a user's role rather than his or her identity? Role-based access control 11. Which of the following is an access control system in which rights are assigned by a central authority? Mandatory access control 12. The principle of separation of responsibility requires a minimum of how many conditions to be met before...

Words: 282 - Pages: 2

Premium Essay

Lab 6

...Anthony Purkapile Introduction Information security continuous monitoring is defined as maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions. This publication specifically addresses assessment and analysis of security control effectiveness and of organizational security status in accordance with organizational risk tolerance. Security control effectiveness is measured by correctness of implementation and by how adequately the implemented controls meet organizational needs in accordance with current risk tolerance. Organizational security status is determined using metrics established by the organization to best convey the security posture of an organization’s information and information systems, along with organizational resilience given known threat information. This includes Maintaining situational awareness of all systems across the organization Maintaining an understanding of threats and threat activities Assessing all security controls Collecting, correlating, and analyzing security-related information Providing actionable communication of security status across all tiers of the organization Active management of risk by organizational officials Purpose The purpose of this guideline is to assist organizations in the development of an ISCM strategy and the implementation of an ISCM program that provides awareness of threats and vulnerabilities, visibility into......

Words: 1881 - Pages: 8

Free Essay

Lab 6

...3. What are three modes of SELinux? Explain their basic functionality. Enforcing: SELinux policy is enforced/SELinux denies access based on policy rules Permissive: SELinux policy is not enforced/SELinux does not deny access, but denials are logged for actions that would have been denied if running in enforcing mode. Disabled: SELinux is disabled/Only DAC (Discretionary Access Control) rules are used. 4. Consider the following firewall rule, and describe what this permits or denies. Allow http (web) traffic through SSL using SSH & allow ICMP pings, while denying all other traffic. 5. What command would you use to allow all the traffic from the loopback? iptables -A INPUT -i lo -m ACCEPT iptables -A OUTPUT -o lo -m ACCEPT 6. What command would you use to view the network port configuration for the iptables? /etc/network/interfaces 7. If a service is to allow in one place and to deny in another, what is the outcome? Allow, because deny is the file pulled first and then the allow file, so the last one pulled is to allow. 8. Is the order of the rules important? If you deny something within the IP network layer, but permit something within the TCP transport layer that uses IP network layer that you just denied, will your TCP traffic be permitted? Yes. Because the "allow/permit" is in the next layer and pulled after the Network layer where you had the "deny", it will work as this is the last information pulled and enforced. 9. If one of the files does......

Words: 355 - Pages: 2

Premium Essay

Week 6 Lab

...NT1110: Module 6 Troubleshooting and Networks Lab 6.1 Troubleshooting Networking Issues A good troubleshooter should be capable of discerning whether the problem is software or hardware related and repair all of these problems. In this lab, you will demonstrate your ability to use the six-step troubleshooting model to fix a networking issue and outline the steps toward a solution. Required Setup and Resources: A computer with access to the Internet Before starting work on Task 1, perform the following steps: 1. Open Internet Explorer. Click the Tools menu and select Internet Options. 2. Click the Connections tab. 3. Click the LAN Settings button. 4. In the Proxy Server section, select Use a proxy server for your LAN. Then, click the Advanced button. 5. In the Proxy Settings window, enter 192.168.100.1 for the HTTP proxy address and port 80 for the port. Note: Remember to reset the proxy settings to their original values when Task 1 is finished. Recommended Procedures Task 1: Network Troubleshooting When you boot your computer and open Internet Explorer, this is what you see: 1 NT1110: Module 6 Troubleshooting and Networks Lab 6.1 Troubleshooting Networking Issues Apply the six-step troubleshooting model to the problem. Document everything associated with each step of the troubleshooting model. 1. Ascertain what the problem is. 2. Write down probable causes of the problem. 3. Determine if theories are correct...

Words: 513 - Pages: 3

Free Essay

Dead End

...You are diary holder number 1 "The random diary" -You will know the diary users that will die before they get eliminated. You are diary holder number 2 "The Yukiteru diary" -You can save diary holder number 1 if he was being eliminated if you choose to. You are diary holder number 3 "The murder diary" -You get to eliminate one diary holder if you choose to. You are diary holder number 4 "The criminal investigation diary" -you will know the 3 diary users who will be eliminating other people. You are diary holder number 5 "The Hyper Vision Diary" -You won't have to answer one of the 3 questions given. You can only use this diary once. You are diary holder number 6 "The Clairvoyance Diary" -You can know about one diary user and the diary's ability. You are diary holder number 7 "The exchange Diary" -You get to choose from number 1-12 (7 is an exception) and you will get the diary's ability (Number of diary you choose) You are diary holder number 8 "The blog diary" -You can bring a dead user back to life. You are diary holder number 9 "The escape Diary" -you can escape from being eliminated. You are diary holder number 10 "The breeder diary" -I will send you the questions first before I post them. You can only use your diary once in this game. You are diary holder number 11 "The watcher" -I will tell you the name of the diary holders and their diary's ability. You are diary holder number 12 "The Justice Diary" -You can......

Words: 277 - Pages: 2

Premium Essay

Lab 6 Security

...Lab #6 - Assessment Worksheet Implementing a Business Continuity Plan Course Name and Number: NT2580 Student Name: Instructor Name: Lab Due Date: Overview In this lab, you implemented a portion of your organization’s BCP. Based on the BIA, the organization determined that the internal Active Directory database and the corporate Web site must be recoverable in the event of system failure or natural disaster. To accomplish this, you configured local backups of Active Directory on the existing virtual server using Windows Server Backup. You also configured the organization’s Web servers to host content from a single NFS share, and back up that NFS share daily using Windows. Lab Assessment Questions & Answers 1. What is the purpose of the business impact analysis (BIA)? The BIA perceives the organization from the impact that is going to occur for an organization in the critical business processes are interrupted or tampered with. 2. What is the difference between the disaster recovery plan (DRP) and a business continuity plan (BCP)? The DRP helps recover the infrastructure necessary for normal business operation whereas the BCP helps keep the critical business processes running should a disaster occur. 3. What are the commands used in Windows 2012 to mount the NFS share on the Linux server. mount -o mtype=hard 4. Is creating redundancy for systems such as Active Directory or Web servers a part of the DRP or the BCP? ...

Words: 304 - Pages: 2

Premium Essay

Is3110 Lab 6

...IS3110 Lab 6 DAWOOD ALRUBAYE 1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities? Because you need to know which is most important and which is negligible. In some cases, protecting your infrastructure from a high priority threat is more important and so you may want to protect against that even if it leaves you vulnerable to low priority threats. This mainly just shows you which areas need your attention the most. 2. 2. Based on your executive summary produced in Lab #4 – Perform a Qualitative Risk Assessment for an IT infrastructure, what was the primary focus of your message to executive management? * Setting up security measures through various means. * Forcing users to update password every X number of days. * Educating users. * Firewalls * Anti-malware 3. Given the scenario for your IT risk mitigation plan, what influence did your scenario have on prioritizing your identified risks, threats, and vulnerabilities? 4. What risk mitigation solutions do you recommend for handling the following risk element? User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers. * A good antivirus program and have all devices scanned as soon as they are plugged in. * Educate employees. * Disable optical drives/USB ports (if they are not needed) 5. What is security baseline definition? A baseline is a starting point or a standard.......

Words: 319 - Pages: 2

Premium Essay

It115 Lab 6

...Lab 6: Basics of Troubleshooting Task 1: Six-Step Troubleshooting Process • Step 1: Ascertain what the problem is.It could be a problem with the Hard Disk. • Step 2: Write down probable causes of the problem. Somehow the Hard Disk was damaged or bios was attacked by a virus. • Step 3: Determine whether theories are correct through testing. Can go to the bios and find out if the Hard Disk is responding. • Step 4: Create and implement a plan to resolve the problem. Do the “Last known good Configuration” and work from there to resolve the problem. • Step 5: Verify that the problem has been fixed; employ preventive measures. Start repair and check Bois battery. • Step 6: Document the entire process. Complete Task 2: Last known Good configuration Utility 1. Complete 2. Complete 3. Question 1: How do you access the advanced Boot Options menu? First restart your computer, then press F8 to access the advanced boot options menu. Question 2: What does the Last Known Good Configuration utility do? It restarts your computer to the last time that it was working correctly so that you can repair it. Question 3: When would you use the Last Known Good Configuration utility? Provide at least one example. I would use it if I had installed a video card that didn’t work or was installed incorrectly. Task 3: Event Viewer 1. 2. Complete 3. Complete 4. Complete 5. Description: Event 219, the source is Kernel-PnP, and the event ID is 219. 6. Complete 7...

Words: 366 - Pages: 2

Free Essay

Alan

...The Big Book of Huddle Energizers Ideas to enliven your huddle Contributed by employees of Citibank Singapore Table of Contents Service Value # 1 – Make Each Interaction Personal ................................................. 6  Energizer: Hebrew Numerology ................................................................................... 6  Energizer: Brain Teaser ............................................................................................... 9  Energizer: Human Treasure Hunt............................................................................... 10  Energizer: Secret Hat Trick ........................................................................................ 11  Energizer: Accentuate the Positive............................................................................. 11  Energizer: Name Game.............................................................................................. 11  Energizer: Heart to Heart ........................................................................................... 11  Energizer: Guess my Body Language ........................................................................ 11  Energizer: How to Say Hello in Different Languages ................................................. 12  Energizer: Good Morning Game ................................................................................ 12  Service Value # 2 – Maintain A Professional Image ...................................................

Words: 24325 - Pages: 98