What is the main difference between a virus and a Trojan?
2.
A virus or malware can impact which of the three tenets of information systems security (confidentiality, integrity, or availability)? In what way?
140
Lab #9
|
Perform a Virus Scan and Malware Identification Scan and Eliminate Threats
37609_LB09_Pass4.indd 140
21/04/13 11:26 AM
Perform a Virus Scan and Malware
Identification Scan and Eliminate Threats
3.
Why is it recommended to do an anti-virus signature file update before performing an anti-virus scan on your computer?
4.
When sending a file, a user asks you to zip it and encrypt the file, if possible. Why would this be?
5.
You receive an e-mail regarding a link from one of your friends for some special documents or private information. Shortly after that you receive the same e-mail from three other friends and the e-mails are not being blocked. What is the likely cause?
9
Assessment Worksheet
141
37609_LB09_Pass4.indd 141
21/04/13 11:26 AM
6.
What are typical indicators that your computer system is compromised?
7.
What elements are needed in a workstation domain policy regarding use of anti-virus and malicious software prevention tools?
1.
What is the main difference between a virus and a Trojan?
2.
A virus or malware can impact which of the three tenets of information systems security (confidentiality, integrity, or availability)? In what way?
140
Lab #9
|
Perform a Virus Scan and Malware Identification Scan and Eliminate Threats
37609_LB09_Pass4.indd 140
21/04/13 11:26 AM
Perform a Virus Scan and Malware
Identification Scan and Eliminate Threats
3.
Why is it recommended to do an anti-virus signature file update before performing an anti-virus scan on your computer?
4.
When sending a file, a user asks you to zip it and encrypt the file, if possible. Why would this be?
5.
You receive an e-mail regarding a link from one of your friends for some special documents or private information. Shortly