complete all three attachments.
Lab#3 – Assessment Worksheet
Configuring BitLocker and Windows Encryption
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
Lab Assessment Questions
1. Within a Microsoft Windows Server 2016 environment, who has access rights
to the EFS features and functions in the server?
2. What are some best practices you can implement when encrypting BitLocker
drives and the use of BitLocker recovery passwords?
3. What was the recovery key generated by BitLocker in this lab?
4. How would you grant additional users access rights to your EFS encrypted
folders and data files?
5. What are the main differences between EFS and BitLocker?
6. The customer privacy data policy in your company’s data classification
standard requires encryption in two places: data stored locally or on a LAN,
and data stored on a laptop. Describe your solution for meeting this policy
requirement.
- Course Name and Number:
- Question 1:
- Question 2:
- Question 3:
- Question 4:
- Question 5:
- Question 6:
Student Name:
Instructor Name:
Lab Due Date:
Lab #3 – Assessment Worksheet
Performing a Post-Mortem Review of a Data Breach Incident
Course Name and Number:
________________________________________________________________
________________________________________________________________
______________________________________________________________
Lab Due Date:
________________________________________________________________
Lab Assessment Questions
1. What is the purpose and function of Google analytics?
2. What is the purpose of performing ongoing website traffic analysis and web
trending analysis on production web servers and websites?
3. How can tcpdump be used as a critical web server tool for conducting ongoing
traffic monitoring and traffic analysis?
4. According to the Live HTTP Headers add-on, what is the user-agent used by the
client browser?
5. Refer to the yourname_S1_SmithyHeader.txt file. What information can you gather
just from the HTTP headers?
6. How can Webalizer aid in the interpretation of web log files?
7. How do tools such as Webtrends work to track website traffic?
- Course Name andNumber:
- LabDue Date:
- Q1:
- Q2:
- Q3:
- Q4:
- Q5:
- Q6:
- Q7:
Student Name:
Instructor Name:
COM520 Written Assignment 3
Assignment: Identifying Types of Malware Infection
Assignment Requirements
You have learned that any computer or device can be vulnerable to malware. Vulnerabilities differ
depending on how the computer or device is used and what software is installed. For each of the
scenarios listed on the worksheet, select the most likely type of malware that is present on the computer
or device and provide a rationale for doing so.
Select from:
a. Virus
b. Worm
c. Trojan horse
d. Rootkit
e. Spyware
Suspected malware scenarios:
_________ 1. You notice that your computer is getting slower each day. You have terminated
unneeded programs, disabled unneeded services, and have recently defragmented
the disks. Your computer has plenty of memory but it still seems slow. Since it only
started getting slow within the last two weeks—you suspect malware. You have
carefully examined each of the programs running but there are no unusual programs.
However, you do notice that there is a substantial disk activity, even when no
programs are running that should be using the disk. What kind of malware do you
think is present in your computer?
_________ 2. You downloaded a new program to display the current weather on your desktop.
Since you installed the weather application, you noticed a lot of network activity, and
your computer is getting slow. When you terminate the weather application your
computer speeds up. What kind of malware do you think is present in your computer?
_________ 3. Within a week after ordering a new widescreen television (TV) from an online retailer,
you start getting many e-mail messages advertising products related to TVs. What
kind of malware do you think is present in your computer?
_________ 4. You downloaded a new game to your personal mobile device that runs Windows
Mobile. You notice on your mobile service bill that several charges appeared for calls
to premium numbers that started three days after loading the new game. What kind
of malware do you think is present in your computer?
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: APA Style
Length: 1–2 pages
Self-Assessment Checklist
I have matched correctly each type of malware with each scenario.
I have provided a sound rationale for each answer.