Different ways that antivirus software can identify malware

Assignment Help Other Subject
Reference no: EM133758447

Describe steps and techniques to perform enumeration, scanning, and packet capture.

Purpose

You will complete two labs in this assessment.

In the first lab, an infected computer may have certain signs like being slower than normal, lots of pop-up ads or it may crash. Computers may be infected even with antivirus applications installed. This lab provides insight into how to tell if a computer is infected and explains what to do if a computer is infected.

In the second lab you will use packet capture utilities to look at different types of IP traffic. Wireshark is used primarily but also TCPDump and NetWitness Evaluator. Then, you will look for specific information in the specific capture tool.

Read the assessment and respond to the checklist items based on the reading and learning activities.

Instructions

Part 1: Identifying and Removing Malware on a Windows System

Lab Instructions

This lab provides the hands-on element to your studies. It allows you to gain practical experience using the tools and techniques associated with ethical hacking.

Access the lab link entitled "Identifying and Removing Malware on a Windows System" in this assessment section.

The following resources will help you get oriented in the lab environment: the Common Lab Tasks Manual and J and B Lab Tips. The manual will provide detail and the tips are a very abbreviated reference.

Open a new Microsoft Word document and put your name and assessment number at the top.

In the lab environment, you will find instructions for the specific lab, which can be downloaded. Follow the instructions.

Complete the instructions in Step 1. Compile your lab report in the document with a title page and an easy to understand explanation of what you are doing and why you are doing it. Within your Word document, after your lab report, answer the question in Step 2.

Conduct research and cite supporting sources in APA format where appropriate.

Complete the following:

Step 1:

Open the lab entitled " Identifying and Removing Malware on a Windows System."

Review the following material in the lab environment:

Before you Begin
Introduction
Section 1. Hands-On Demonstration
When you are ready to begin click: "Section 2: Applied Learning."

Complete Parts 1, 2, and 3. Make sure to obtain the required screenshots that are noted in the lab instructions and rubric.

It is not necessary to transfer the scan file to your computer.

As part of the mastery requirements for this competency assessment, complete the following boldfaced item and place into the Word document:

Provide a minimum 200-word overview of the lab.

Step 2:

Answer the following question in the lab document as part of the lab submission. Respond with a minimum of 100 words.

1. What are the different ways that antivirus software can identify malware?

As part of the mastery requirements for this competency assessment, complete the following boldfaced item and place into the Word document:

Provide a minimum of 400 words to the following:

What are the different ways that antivirus software can identify malware?

Part 2: Analyzing Network Traffic to Create a Baseline Definition

Lab Instructions

This lab provides the hands-on element to your studies. It allows you to gain practical experience using the tools and techniques associated with ethical hacking.

Access the lab link entitled "Analyzing Network Traffic to Create a Baseline Definition" in this assessment section.

The following resources will help you get oriented in the lab environment: the Common Lab Tasks Manual and J and B Lab Tips. The manual will provide detail and the tips are a very abbreviated reference.

You will append the results of the second lab to the results of the first lab. Make sure to label the labs.

In the lab environment, you will find instructions for the specific lab, which can be downloaded. Follow the instructions.

Complete the instructions in Step 1. Compile your lab report in the document with a title page and including explanatory text where needed or required by the lab. Within your document, after your lab report, answer the question in Step 2.

Conduct research and cite supporting sources in APA format where appropriate.

Complete the following:

Step 1:

Open the lab entitled "Analyzing Network Traffic to Create a Baseline Definition."

Click the "Start Lab" tab in the middle of the webpage.

Review the following material in the lab environment:

Before you Begin
Introduction
Section 1. Hands-On Demonstration
When you are ready to begin click: "Section 2: Applied Learning."

Complete Parts 1, 2, 3, 4, and 5. Make sure to obtain the required screenshots that are noted in the lab instructions and rubric.

As part of the mastery requirements for this competency assessment, complete the following boldfaced item and place into the Word document:

Using a minimum of 5 steps, provide a step-by-step guide to password hash file extraction and cracking using a well-known password cracking tool.

Step 2:

Answer the following question in the lab document as part of the lab submission. Respond with a minimum of 100 words.

1. What are some ways to make sure that passwords cannot be captured by packet capture utilities?

As part of the mastery requirements for this competency assessment, complete the following boldfaced item and place into the Word document:

Using a minimum of 100 words, explain how security password policy compliance can be checked using Wireshark.

Reference no: EM133758447

Questions Cloud

Discuss the importance of linking primary care : Compare and contrast the ways that state and local governments can work with healthcare organizations to foster integration between primary care and public
Hinder the development of the walkways : Discuss at least two factors that would facilitate the development of the walkways. Discuss at least two factors that would hinder the development
Which component should be included in the discharge teaching : A client is about to be discharged after undergoing surgery for the treatment. Which component(s) should be included in the discharge teaching for this client?
How should the nurse respond : The nurse is seeing a client who has just been diagnosed with a meningioma. The client states he is confused because the provider. How should the nurse respond?
Different ways that antivirus software can identify malware : Describe steps and techniques to perform enumeration, scanning, and packet capture and 1. What are the different ways that antivirus software can identify
What type of brain tumor has the potential to cause : A 33-year-old man who is in healthy physical condition has been admitted. What type of brain tumor has the potential to cause this man's health problem?
Discuss the challenges that each of individuals identified : Discuss the challenges that each of the individuals identified in their writings. Analyze these drivers and challenges and compare them with your own experience
Identify four influences on americans during the colonial : Identify at least four influences on Americans during the Colonial and Neoclassical eras.
Discuss managed cares role in promoting health : Discuss the impact that managed care has on the access, financing, and delivery of healthcare in the United States. Discuss managed care's role in promoting

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd