Antivirus and nmap scans | CYB205 Infrastructure Administration | University of Phoenix

 

Complete the Practice Lab titled “AntiVirus and NMAP Scans.”

Capture screenshots taken during the lab in a Microsoft® Word document as specified within the lab instructions.

At the end of the lab, you will be asked to respond to the following in a 2- to 2.5-page response at the end of your Microsoft® Word document: 

  • Most network breaches go undetected for weeks or even months, and an attacker usually takes steps to be much more careful than our scans were. With that in mind, write a short paragraph describing how the default Windows® firewall and security settings might contribute to this inability to detect an attacker probing from inside your network.
  • This was just a single system on a local LAN. How much more complicated would this process be for 100 computers? What about an enterprise with 10,000 computers on their LAN/WAN?
  • Consider a cloud-hosted Infrastructure as a Service (IaaS) environment with many new, internet-accessible systems regularly being built and brought online. What advantages or challenges might there be protecting such systems from malware and from attack?
  • Finally, conclude this week’s assignment with a page explaining how the same types of tools demonstrated in this lab might be used by an infrastructure administrator to help secure an environment.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>