CYB 230 Module Two Lab Worksheet

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

230

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

5

Uploaded by DrCrownZebra9

Report
CYB 230 Module Two Lab Worksheet Complete this worksheet by replacing the bracketed phrases in the Response column with the relevant information. Lab: Ubuntu Desktop Linux Installation Prompt Response In the lab section “Install Ubuntu Using a Custom Hard Disk Layout,” Step 25 , use your name for the user information and provide a screenshot of the output before clicking Continue .
Prompt Response In the lab section “Installing Patches With the Ubuntu Software Updater,” Step 8 , provide a screenshot of the output before clicking Authenticate . Missed the screenshot for this section, it was step 6 in the lab but this template said step 8 which doesn’t exist in the lab. What is the importance of keeping an operating system patched and up- to-date? It guarantees the system is up to date and secured against vulnerabilities. Keeping a system up to date keeps it safe. Lab: Disk Maintenance and Data Recovery
Prompt Response In the lab section “Backing Up and Restoring Data,” provide a screenshot of the output of Step 51 . In the industry, desktops are typically cloned and images are used on multiple PCs. Explain how using the restore point utility can help with the rebuilding and testing of PCs. Using a restore point can help quickly deploy and redeploy a system for a user or multiple users. I could see how creating a restore point with default programs and settings could help quickly setup a new system for a new employee. Lab: Patching, Securing Systems, and Configuring Anti-Virus
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Prompt Response In the lab section “Closing Unnecessary Ports,” Step 30 , insert your name at the command line below the output and include it in your screenshot. In the lab section “Exploitation and Patching,” Step 18 , insert your name at the command line below the output and include it in your screenshot.
Prompt Response Explain why it is important to close ports that are not being used within a computer system. A port is essentially an open window for traffic to come in and out of. By closing unnecessary ports you are limiting the amount of malicious traffic that can enter your network.