Question: ONLY INCLUDE ANSWER THIS IS TO COMPARE WITH MY CURRENT WORK This is the Skills Final Test or Portfolio This test provides evidence of your
ONLY INCLUDE ANSWER
THIS IS TO COMPARE WITH MY CURRENT WORK
This is the Skills Final Test or Portfolio
This test provides evidence of your abilitiesdeveloped from Fundamentals of Information Security class. Please include screen shots as well as a respectiable ip address
Thank you
Several sections of this final require you to perform operations on a computer system. Select anoperating system and setup a computer for this final named ricky
You may consult appropriate reference materials to complete this final. The work you report isyours alone. Please contact me with any questions.
This section is worth points toward the final. Please put all the required documentation in apdf file called sectionpdf
Configure a virtual machine named ricky Provide ricky IP addresses and MAC addresss
Provide evidence the operating system is current will all applicably updates for ricky
Provide a list of all installed programs on ricky
Provide evidence each installed program is current with all applicable updates.
Provide evidence the antimalware engine and definitions are current.
Provide the results of a full diskall files antimalware scan showing no malware.
Provide evidence all daily logonslogins are not full administrator.
Provide evidence full administration accounts may not logon over the network to ricky
Provide documentation explaining how to backup all important files.
Provide evidence of successfully backing up and restoring to an external drive all important files on ricky
This section is worth points toward the final. Please put all the required documentation in apdf file called sectionpdf
Identify the CIS document that most closely matches the operating system installed on ricky
Select ten different recommendations from the CIS document for ricky Provide the following information for each item selected.
The full name of the control.
Evidence the control is successful applied to ricky
With two or more sentences, explain how the control enhances privacy.
With two or more sentences explain how the control enhances legal compliance.
With two or more sentences explain how the control supports acceptable ethics.
Note:
Consider run assessor, any noncompliance must be justified.
This section is worth points toward the final. Please put all the required documentation in apdf file called sectionpdf
Provide evidence ricky synchronizes with a time server.
Provide directions for configuring ricky to collect Authentication and Authorization Reports as defined in the Top Log Reports.
Explain how Authentication and Authorization Reports log entries as defined in the Top Log Reports from ricky Explain how each report fits within this category.
Provide directions for configuring ricky to collect Systems and Data Change Reports as defined in the Top Log Reports.
Provide two different Systems and Data Change Reports log entries as defined in the Top Log Reports from ricky Explain how each report fits within this category.
Provide directions for configuring ricky to collect Network Activity Reports as defined in the Top Log Reports.
Provide two different Network Activity Reports log entries as defined in the Top Log Reports from ricky Explain how each report fits within this category.
Provide directions for configuring ricky to collect Resource Access Reports as defined in the Top Log Reports.
Provide two different Resource Access Reports log entries as defined in the Top Log Reports from ricky Explain how each report fits within this category.
Provide directions for configuring ricky to collect Malware Activity Reports as defined in the Top Log Reports.
Provide two different Malware Activity Reports log entries as defined in the Top Log Reports from ricky Explain how each report fits within this category.
Provide directions for configuring ricky to collect Failure and Critical Error Reports as defined in the Top Log Reports.
Provide two different Failure and Critical Error Reports log entries as defined in the Top Log Reports from ricky Explain how each report fits within this category.
This section is worth points toward the file.
Please put all the required documentation in a pdf file called winpdf Please label your answers in the document.
Provide a copy of the grant of permission to run a port scan only using NMAP or similar on the network. The permission document must include all the information requested on the sample permission d
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
