Top-Rated Free Essay
Preview

Lab 7 Ethical Hacking

Satisfactory Essays
293 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 7 Ethical Hacking
Lab #6 – Assessment Worksheet
Identifying and Removing Malware on a Windows System
CSS280-1404B-01 Ethical Hacking
Course Name and Number: _____________________________________________________

Douglas Matthews
Student Name: ________________________________________________________________
Brandon DeLeeuw
Instructor Name: ______________________________________________________________
12/15/2014
Lab Due Date: ________________________________________________________________

Overview
In this lab, you used AVG AntiVirus Business Edition to identify the viruses, worms, Trojans, malware, or other malicious software found on a compromised Windows machine. You completed a scan of the entire computer, learned how to exclude folders to avoid false positives, and understood the importance of maintaining the signatures database. You discovered the difference between a full computer scan and a Resident Shield scan. Finally, you also permanently removed the malware identified by the antivirus software and scheduled the scan to run automatically.
Lab Assessment Questions & Answers
1. Why is it recommended to update the antivirus software’s signature database before performing an antivirus scan on your computer?
Updating the antivirus software with the latest virus definitions ensures the software has the latest information to identify and quarantine threats.

2. What are typical indicators that your computer system is compromised?
Slow response opening, operating system not booting up correctly or no functioning normally, event logs reporting numerous unusual alerts.

3. Where does AVG AntiVirus Business Edition place viruses, Trojans, worms, and other malicious software when it finds them?
It places the virus in a Virus Vault which is a quarantine area where all removed files, viruses go.

.

4. What other viruses, Trojans, worms, or malicious software were identified and quarantined by AVG within the Virus Vault?
Exploit, trojan horse dropper

5. What is the difference between the complete scan and the Resident Shield?
Complete scan, scans the entire computer while resident shield scans a folder.

Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com

Student Lab Manual

You May Also Find These Documents Helpful

  • Powerful Essays

    Unit 7 P3 Research Paper

    • 1234 Words
    • 5 Pages

    Virus protection – virus protection protects a computer system from malicious viruses and Trojans and worms which you can be infected by through the internet or email or downloading files or through a USB flash drive etc. virus protection usually consists of a firewall, virus scanner, virus remover and spyware. With virus protection you can perform a scan on your computer to check if you have been infected by any viruses or Trojans or worms. With some virus protections software’s you can scan your computer then it will ask you if you want the viruses removed, also if any programs have been infected the virus protection will ask you if you want the infected program deleted, most virus…

    • 1234 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    ISSC362 Week 2 Lab

    • 454 Words
    • 2 Pages

    6. Which tool and application were used to exploit the identified vulnerability on the targeted Microsoft® Windows…

    • 454 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1330 Unit 1

    • 345 Words
    • 2 Pages

    And once malwares, Trojans, viruses gain entry into the computer system then these software programs destabilize the operating system, cause damage to it. It is recommended to install and use effective PWS: Win32/QQpass.GR removal software like VSKsoft antivirus software to get rid of all malware related issues.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    To demonstrate that a particular type of virus can be written or created, some virus writers create “proof of concept” viruses that do not cause…

    • 546 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    A virus or malware can impact which of the three tenets of information systems security (confidentiality,…

    • 1020 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Lab 2

    • 639 Words
    • 2 Pages

    1. What are the various types of malware? How do worms differ from viruses? Do Trojan…

    • 639 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    ISSC421 Lab 3

    • 414 Words
    • 2 Pages

    You can use the log files to ID malware form the incidence logs. They should tell you when something was downloaded or uploaded to the computer. If you know some minor details about what it is you are looking for then you should be able to ID the malware file that was put on the computer.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Viruses have been around for a long time, and can render a system useless if not dealt with. New, more destructive viruses and worms are being unleashed exponentially. Reports indicate that 50 percent more virus attacks were launched in 2003 than the prior year. The January-March 2004 Mydoom virus outbreaks were the biggest the Internet has encountered to date.…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    * Is the virus software configured to scan all the important hard drives and files?…

    • 594 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Discussion question

    • 1527 Words
    • 7 Pages

    Screen shot of the detailed view of the 2nd infection "";"C:\Helix\IR\nirsoft\LSASecretsView.exe";"May be infected by unknown virus Win32/DH{HhMXFE8VGw}";"Moved to Virus Vault"…

    • 1527 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Incident response begins with prevention and security awareness (figure 1). In the case of malware attacks such as viruses, worms or Trojan horses, defense-in-depth plays a large role in the defense and early detection of potential threats to information systems connected to the internet. Personnel utilizing these assets also play a large role in defending and protecting these assets. Authorized users should be aware of all policies and procedures pertaining to the proper use of all networks, applications, and systems within the organization. The frequency of incidents can be greatly reduced through user awareness (Whitman, Mattord, & Green, 2014).…

    • 805 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Riordan Sr-Rm-013

    • 722 Words
    • 3 Pages

    As said by Roger Thompson, chief research officer of AVG, rouge antivirus products are common” The Bad guys are clearly making money at it”. Who hasn’t seen those much hated pop ups stating your computer is infected and needs a scan? Who now is silly enough to actually click on those? One would be surprised. Given that this article was written in 2009, it is still very relevant, and it seems like the more and more we still can’t seem to slow down those pop ups. Although now it seems like those pop ups come out of nowhere without you…

    • 722 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Lab 4

    • 1087 Words
    • 3 Pages

    4. What Trends were tracked when it came to Malicious Code in 2009 by the Symantec Report researched during this lab?…

    • 1087 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Lab #9

    • 650 Words
    • 3 Pages

    2. When an antivirus application identifies a virus and quarantines this file, does this mean the computer is free of the virus and any malicious software?…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    So in the goal to stop the development of this kind of virus, some companies created antivirus softwares during the 1980s to protect the users from theses problems.…

    • 522 Words
    • 3 Pages
    Satisfactory Essays