complete all three attachments.
Lab#3 – Assessment Worksheet
Configuring BitLocker and Windows Encryption
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
Lab Assessment Questions
1. Within a Microsoft Windows Server 2016 environment, who has access rights
to the EFS features and functions in the server?
2. What are some best practices you can implement when encrypting BitLocker
drives and the use of BitLocker recovery passwords?
3. What was the recovery key generated by BitLocker in this lab?
4. How would you grant additional users access rights to your EFS encrypted
folders and data files?
5. What are the main differences between EFS and BitLocker?
6. The customer privacy data policy in your company’s data classification
standard requires encryption in two places: data stored locally or on a LAN,
and data stored on a laptop. Describe your solution for meeting this policy
requirement.
Lab #3 – Assessment Worksheet
Performing a Post-Mortem Review of a Data Breach Incident
Course Name and Number:
________________________________________________________________
________________________________________________________________
______________________________________________________________
Lab Due Date:
________________________________________________________________
Lab Assessment Questions
1. What is the purpose and function of Google analytics?
2. What is the purpose of performing ongoing website traffic analysis and web
trending analysis on production web servers and websites?
3. How can tcpdump be used as a critical web server tool for conducting ongoing
traffic monitoring and traffic analysis?
4. According to the Live HTTP Headers add-on, what is the user-agent used by the
client browser?
5. Refer to the yourname_S1_SmithyHeader.txt file. What information can you gather
just from the HTTP headers?
6. How can Webalizer aid in the interpretation of web log files?
7. How do tools such as Webtrends work to track website traffic?
Student Name:
Instructor Name:
COM520 Written Assignment 3
Assignment: Identifying Types of Malware Infection
Assignment Requirements
You have learned that any computer or device can be vulnerable to malware. Vulnerabilities differ
depending on how the computer or device is used and what software is installed. For each of the
scenarios listed on the worksheet, select the most likely type of malware that is present on the computer
or device and provide a rationale for doing so.
Select from:
a. Virus
b. Worm
c. Trojan horse
d. Rootkit
e. Spyware
Suspected malware scenarios:
_________ 1. You notice that your computer is getting slower each day. You have terminated
unneeded programs, disabled unneeded services, and have recently defragmented
the disks. Your computer has plenty of memory but it still seems slow. Since it only
started getting slow within the last two weeks—you suspect malware. You have
carefully examined each of the programs running but there are no unusual programs.
However, you do notice that there is a substantial disk activity, even when no
programs are running that should be using the disk. What kind of malware do you
think is present in your computer?
_________ 2. You downloaded a new program to display the current weather on your desktop.
Since you installed the weather application, you noticed a lot of network activity, and
your computer is getting slow. When you terminate the weather application your
computer speeds up. What kind of malware do you think is present in your computer?
_________ 3. Within a week after ordering a new widescreen television (TV) from an online retailer,
you start getting many e-mail messages advertising products related to TVs. What
kind of malware do you think is present in your computer?
_________ 4. You downloaded a new game to your personal mobile device that runs Windows
Mobile. You notice on your mobile service bill that several charges appeared for calls
to premium numbers that started three days after loading the new game. What kind
of malware do you think is present in your computer?
Submission Requirements
Format: Microsoft Word
Font: Arial, Size 12, Double-Space
Citation Style: APA Style
Length: 1–2 pages
Self-Assessment Checklist
I have matched correctly each type of malware with each scenario.
I have provided a sound rationale for each answer.
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.