ISSC 342 Lab 4 Lab Assessment Questions ...
ISSC_342_Lab_4_Lab_Assessment_Questions_Answers_Corral.docx-Lab #4 – Assessment Worksheet Overview
Showing 1 out of 2
ISSC 342 Lab 4 Lab Assessment Questions Answers Co...
ISSC_342_Lab_4_Lab_Assessment_Questions_Answers_Corral.docx-Lab #4 – Assessment Worksheet Overview
ISSC 342 Lab 4 Lab Assessment Quest...
ISSC_342_Lab_4_Lab_Assessment_Questions_Answers_Corral.docx-Lab #4 – Assessment Worksheet Overview
Page 1
Lab #4 – Assessment Worksheet
Overview
In this lab, you used AVG Business Edition 2012, an anti-virus and anti-malware
software tool, to identify malware and malicious software on an infected Microsoft
®
workstation. You researched remediation for the malware identified by the scan, and
took actions to remove those programs. You also used Windows Defender to perform
the same actions on a Windows 2008 server.
Lab Assessment Questions & Answers
1.
What do a virus, a worm, spyware, and malicious code have in common? What
are the differences among these four threats: a virus, a worm, spyware, and a
malicious code?
-
A virus is a program that attaches to, or copy itself into other programs.it
causes the computer to follow instruction not intended by the original
program.
-
A worm is a malware that is self-contained, it replicated and sends copies of
itself to other computers.
-
Spyware is software that covertly collects information without the user’s
knowledge or permission, said information may be sensitive personal
information like passwords or credit card information.
-
They all are created to infiltrate a computer and do undesired and/or
operated without the explicit consent of the owner.
2.
How often should you update your anti-virus protection?
-
Since there are 70 000 new threats every day, users should update their
computer once a day.
3.
Why is it a best practice to have and to carry an anti-virus boot-up disk or CD?
-
In case the operating system is not able to load, the boot-up disk will allow
user to boot up computer and delete malicious software.
4.
What other anti-malicious software and anti-malicious code applications are
included with AVG? What risk and threats do these help mitigate?
-
Signature database. Collection of identifying instructions for known malware
used to
detect malware in existing programs and files
-
Scanner. Software that compares existing file contents with a signature
database to identify malware.
-
Vault. Secure location on disk used to store identified malware.
-
Shield. Software that intercept all incoming information, scanning each
message or file for malware content.
5.
In a corporate environment, should new AV definitions be installed as soon as
they are available?
-
Yes
6.
Is the Quick scan good enough protection for a system?
-
No, some malicious software will be store deep within the operating system
files.
7.
Besides the ones mentioned above, what other best practices for the workstation
domain could mitigate the risks and threats caused by malicious code?


Ace your assessments! Get Better Grades
Browse thousands of Study Materials & Solutions from your Favorite Schools
American Public Universit...
American_Public_University_System
School:
Operating_Systems_Hardening_and_Security
Course:
Great resource for chem class. Had all the past labs and assignments
Leland P.
Santa Clara University
Introducing Study Plan
Using AI Tools to Help you understand and remember your course concepts better and faster than any other resource.
Find the best videos to learn every concept in that course from Youtube and Tiktok without searching.
Save All Relavent Videos & Materials and access anytime and anywhere
Prepare Smart and Guarantee better grades

Students also viewed documents