Computer lab assignment, computer science homework help

User Generated

nzryvnwnzvr

Computer Science

Description

This week, you should successfully complete the activities for labs 9 and 10, and you should complete and submit the assessment worksheet assignment to your instructor for grading. Use the following instructions to successfully complete your assignment:

  • Use the labs link that was provided by Words of Wisdom by using your own passcode. By now, you should have received the link and the passcode in a separate e-mail.
  • To complete lab 9, access and complete the lab activities under topic 9: Eliminating Threats with a Layered Security Approach.
  • To complete lab 10, access and complete the lab activities under topic 10: Implementing an Information Systems Security Policy.
  • For each lab (lab 9 and lab 10), complete the following:
    • Read the lab manual very carefully, and familiarize yourself with the assignment scenarios and other instructions before accessing the virtual lab environment.
    • Watch the video that is associated with each lab.
    • Access the lab environment, and complete all of the lab activities.
    • Complete the assessment worksheet assignment template for both labs, and send them to your instructor for grading

I will provide credentials once have accepted you

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Please review the work

Assessment Worksheet
Eliminating Threats with a Layered Security Approach
Introduction to Computer Security-CSS150
Course Name and Number: _____________________________________________________
Syed Saaim
Student Name: ________________________________________________________________
Kenneth Orgill
Instructor Name: ______________________________________________________________
21/06/2017
Lab Due Date: ________________________________________________________________

Overview
In this lab, you used AVG, an antivirus scanning program, to identify malware found on a
compromised system. You also examined the services available on the Windows vWorkstation
machine and disabled an unnecessary service. In addition, you configured the Windows Firewall,
enabled ICMP traffic, and created a new rule for the FileZilla Server application.
Lab Assessment Questions & Answers
1. What is the main difference between a virus and a Trojan?
Ans: A virus is a program that is capable of replicating with little or no user intervention, and the
replicated programs also replicate further. There is typically a piece of code that causes an
unexpected, usually malicious, event (payload) to occur. Viruses are often disguised as games or
2. Aimages
virus or
malware
can impacttitles.
whichA of
the three
of informat...


Anonymous
Nice! Really impressed with the quality.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags