IT-FPX4803_GwynnHonda_Assessment3-1

docx

School

Capella University *

*We aren’t endorsed by this school

Course

4803

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

11

Uploaded by Five4Fit

Report
IT-FPX4803 - System Assurance Security Assessment 3 Template Part 1: Lab Exercise Screenshots: Insert and title (with step number) all screenshots in the same order as the order specified in the assessment directions. Section 1 Part 1 Step 18 Virus details 1
Step 27 Empty Quarantine area (Virus Vault) 2
Part 2 Step 9 Changed startup type in the list of services 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Part 3 Step 8 updated File and Printer Sharing (Echo Request – ICMPv4-ln) 4
Step 17 new FileZilla Server rule 5
Section 2 Part 1 Step 8 Scan Summary (Detections) page 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Step 12 empty Quarantine area (Virus Vault) 7
8
Section 2 Part 2 Step 5 updated list of services Step 7 the updated Email and accounts rules 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Step 9 new FileZilla Server outbound rule Part 1.3 Response: Disabling unneeded services is important because it can help block possible threats like viruses or malware. There are many different methods of infecting a computer with a virus like Trojan, or malware. When a system or network is being monitored on a constant and consistent basis, it will help to reduce or eliminate the chances of risks. Using AVG in the lab helped to see the threats and to quarantine them immediately. The files were suspected to be viruses, but at some point, they could have been determined to be necessary files. Therefore, quarantine or virus vaults are used to house that specific threat. This method can quickly help 10
prevent potential harm to the network and/or computer system. Part 2: Security Planning [Enter content for Part 2 of the assessment here – make sure to label your work appropriately)] [Item 2.1]: [Item 2.2]: 11