Question: ONLY INCLUDE ANSWER THIS IS TO COMPARE WITH MY CURRENT WORK This is the Skills Final Test or Portfolio This test provides evidence of your

ONLY INCLUDE ANSWER
THIS IS TO COMPARE WITH MY CURRENT WORK
This is the Skills Final Test or Portfolio
This test provides evidence of your abilitiesdeveloped from Fundamentals of Information Security class. Please include screen shots as well as a respectiable ip address
Thank you
Several sections of this final require you to perform operations on a computer system. Select anoperating system and setup a computer for this final named ricky15.
You may consult appropriate reference materials to complete this final. The work you report isyours alone. Please contact me with any questions.
1. This section is worth 100 points toward the final. Please put all the required documentation in apdf file called section1.pdf.
1.1. Configure a virtual machine named ricky15. Provide ricky15 IP addresses and MAC address(s).
1.2. Provide evidence the operating system is current will all applicably updates for ricky15.
1.3. Provide a list of all installed programs on ricky15.
1.4. Provide evidence each installed program is current with all applicable updates.
1.5. Provide evidence the anti-malware engine and definitions are current.
1.6. Provide the results of a full disk/all files anti-malware scan showing no malware.
1.7. Provide evidence all daily logons/logins are not full administrator.
1.8. Provide evidence full administration accounts may not logon over the network to ricky15.
1.9. Provide documentation explaining how to backup all important files.
1.10. Provide evidence of successfully backing up and restoring to an external drive all important files on ricky15.
2. This section is worth 100 points toward the final. Please put all the required documentation in apdf file called section2.pdf.
2.1. Identify the CIS document that most closely matches the operating system installed on ricky15.
2.2. Select ten different recommendations from the CIS document for ricky15. Provide the following information for each item selected.
2.2.1. The full name of the control.
2.2.2. Evidence the control is successful applied to ricky15.
2.2.3. With two or more sentences, explain how the control enhances privacy.
2.2.4. With two or more sentences explain how the control enhances legal compliance.
2.2.5. With two or more sentences explain how the control supports acceptable ethics.
2.3. Note:
2.3.1. Consider run assessor, any non-compliance must be justified.
3. This section is worth 100 points toward the final. Please put all the required documentation in apdf file called section3.pdf.
3.1. Provide evidence ricky15 synchronizes with a time server.
3.2. Provide directions for configuring ricky15 to collect Authentication and Authorization Reports as defined in the Top 6 Log Reports.
3.3. Explain how Authentication and Authorization Reports log entries as defined in the Top 6 Log Reports from ricky15. Explain how each report fits within this category.
3.4. Provide directions for configuring ricky15 to collect Systems and Data Change Reports as defined in the Top 6 Log Reports.
3.5. Provide two different Systems and Data Change Reports log entries as defined in the Top 6 Log Reports from ricky15. Explain how each report fits within this category.
3.6. Provide directions for configuring ricky15 to collect Network Activity Reports as defined in the Top 6 Log Reports.
3.7. Provide two different Network Activity Reports log entries as defined in the Top 6 Log Reports from ricky15. Explain how each report fits within this category.
3.8. Provide directions for configuring ricky15 to collect Resource Access Reports as defined in the Top 6 Log Reports.
3.9. Provide two different Resource Access Reports log entries as defined in the Top 6 Log Reports from ricky15. Explain how each report fits within this category.
3.10. Provide directions for configuring ricky15 to collect Malware Activity Reports as defined in the Top 6 Log Reports.
3.11. Provide two different Malware Activity Reports log entries as defined in the Top 6 Log Reports from ricky15. Explain how each report fits within this category.
3.12. Provide directions for configuring ricky15 to collect Failure and Critical Error Reports as defined in the Top 6 Log Reports.
3.13. Provide two different Failure and Critical Error Reports log entries as defined in the Top 6 Log Reports from ricky15. Explain how each report fits within this category.
4. This section is worth 100 points toward the file.
4.1. Please put all the required documentation in a pdf file called win01.pdf. Please label your answers in the document.
4.1.1. Provide a copy of the grant of permission to run a port scan only using NMAP or similar on the network. The permission document must include all the information requested on the sample permission d

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!