CYB_230_Module_Two_Lab_Bailey_Holly

docx

School

University of Missouri, Columbia *

*We aren’t endorsed by this school

Course

7850

Subject

Computer Science

Date

Apr 3, 2024

Type

docx

Pages

5

Uploaded by bails4

Report
Bailey Holly Professor Mitchell Operating System Security CYB-230-R3435 21 January 2024 CYB 230 Module Two Lab Worksheet Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information. Lab: Ubuntu Desktop Linux Installation Prompt Response In the lab section “Install Ubuntu Using a Custom Hard Disk Layout,” Step 25 , use your name for the user information and provide a screenshot of the output before clicking Continue .
Bailey Holly Professor Mitchell Operating System Security CYB-230-R3435 21 January 2024 Prompt Response In the lab section “Installing Patches With the Ubuntu Software Updater,” Step 8 , provide a screenshot of the output before clicking Authenticate . What is the importance of keeping an operating system patched and up- to-date? Unpatched systems are vulnerable to attacks, allowing malicious actors to steal data, install malware, or disrupt operations. These updates are constantly improving your defense against evolving threats with stronger encryption, better authentication, and sharper intrusion detection. Updates also lead to improved performance, stability, and compatibility with the latest applications and hardware. Lab: Disk Maintenance and Data Recovery
Bailey Holly Professor Mitchell Operating System Security CYB-230-R3435 21 January 2024 Prompt Response In the lab section “Backing Up and Restoring Data,” provide a screenshot of the output of Step 51 . In the industry, desktops are typically cloned and images are used on multiple PCs. Explain how using the restore point utility can help with the rebuilding and testing of PCs. One of the main advantages is when one is testing changes or configurations on cloned PCs, restore points allow for instant rollbacks to a previous working state. The opposite also applies here, we can capture successful configurations as restore points and apply them to clones PCs, achieving rapid development and consistent setups. Another advantage would include, if a mistake were to occur, restore points provide a quick escape route, preventing lengthy troubleshooting, and leading to efficient issue resolution. Lab: Patching, Securing Systems, and Configuring Anti-Virus
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Bailey Holly Professor Mitchell Operating System Security CYB-230-R3435 21 January 2024 Prompt Response In the lab section “Closing Unnecessary Ports,” Step 30 , insert your name at the command line below the output and include it in your screenshot.
Bailey Holly Professor Mitchell Operating System Security CYB-230-R3435 21 January 2024 Prompt Response In the lab section “Exploitation and Patching,” Step 18 , insert your name at the command line below the output and include it in your screenshot. Explain why it is important to close ports that are not being used within a computer system. The main advantage of closing unused ports is that open ports act as potential entry points for attacks; closing them shrinks the attack surface, making it more difficult for intruders to find a way in. They can also be exploited for unauthorized remote access, data theft, or malware installation, closing the ports can block these pathways. Finally, open ports can consume system resources, which could impact performance, closing these ports improves overall efficiency.