CYB 230 Module Two Lab Worksheet

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

230

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

3

Uploaded by ISSIT_Learn

Report
CYB 230 Module Two Lab Worksheet Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information. Lab: Ubuntu Desktop Linux Installation Prompt Response In the lab section “Install Ubuntu Using a Custom Hard Disk Layout,” Step 25 , use your name for the user information and provide a screenshot of the output before clicking Continue . [ ] In the lab section “Installing Patches With the Ubuntu Software Updater,” Step 8 , provide a screenshot of the output before clicking Authenticate . [ ] What is the importance of keeping an operating system patched and up- to-date? [Keeping systems and applications up-to-date is critical to their security. Not keeping them up-to-date will make them vulnerable to attacks from people looking to exploit them. The longer the systems and apps are without the proper patches, the higher the chance that they will fall victims to an attack. According to InfoSec, “patching helps close security holes that can be leveraged by an attacker”.]
Lab: Disk Maintenance and Data Recovery Prompt Response In the lab section “Backing Up and Restoring Data,” provide a screenshot of the output of Step 51 . [ In the industry, desktops are typically cloned and images are used on multiple PCs. Explain how using the restore point utility can help with the rebuilding and testing of PCs. [Using the restore point or system restore allows an administrator to restore a system back to a previous working state when a newly installed, or an updated program/driver does not behave properly and causes issues within the system. It is much simpler to go back to that previous working version than having to re-install an entire system with all its app and updates. ] Lab: Patching, Securing Systems, and Configuring Anti-Virus Prompt Response In the lab section “Closing Unnecessary Ports,” Step 30 , insert your name at the command line below the output and include it in your screenshot. [ ]
Prompt Response In the lab section “Exploitation and Patching,” Step 18 , insert your name at the command line below the output and include it in your screenshot. [ ] Explain why it is important to close ports that are not being used within a computer system. [Open ports that are not in use may have default configurations and passwords which may not be very secure. Old versions of software that is running on these open ports may not have the latest updates and patches which leaves them vulnerable to attackers who know their vulnerabilities. Attackers may scan your ports and gain a better understanding on what services are being run them like what is your operating system. Knowing something like this, they can now do more specific research on vulnarabilities that they can exploit in your system. ]
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help