SEOTrance
SiteMap
Website Deployment
Website Design
Website Models
Web Development
Web Technologies
Search Engines
Safeguard Network
«Prev
Next»
Web Technologies
Accessing Internet
Internet Connection
HW/SW Access
Configure MAC
Configuring Windows Internet
Configure Hosts File
DHCP Static IP
Configuring Browser Performance
Browsers, Cookies, Activex
Email Rx, Tx
Common Mime Types
Mime File Examples
Internet Summary
Infrastructure Framework
OSI Network Model
Internet Infrastructure
Backbones Network
Network Hardware SW
Different Server Types
Additional Server Functions
Internet Bandwidth Technologies
Internet Bandwidth Protocols
Data Transfer Speed
Server Transfer Load
Network Diagnostic Tools
Network Analyzers
Configuration Problems
Internet Foundation Conclusion
Network Devices - Quiz
Internet Protocols
Nature Purpose Protocols
TCP/IP Protocol
TCP/IP Address Classifications
Purpose Subnet Masks
Remote Protocols
Point2Point VPN
Emai Name Protocols
Web Protocols
DNS
DNS Structure
URL
Operational Protocols
Internet Technologies
HTTP Error Codes
FTP
Command Line Transfer
What is Telnet
Email Directories
Group Communication
Additional Web Technologies
Search Engines
Wild Card Searches
Communication Services
Safeguard Network
Detect Security Breaches
Web Conclusion
Counteracting Attacks - Exercise
Protecting against attacks
Objective:
Demonstrate understanding of the core competencies to counteract malicious attacks on a system.
Scoring
This exercise is worth a total of 5 points. To receive full credit, you will need to answer the question below in as complete detail as possible. Once you have completed your answer you will submit your answer.
Background/overview
One day you walk in to your office, sit down at your "space," log on to your computer, and start reading your new email. One particular email has an attachment. When you attempt to open the attachment your virus software displays the following message:
VIRUS WARNING: The following file contains a macro.
Remove the macro (Y/N)?
What would you do? (You may want to search the Internet, using the keyword "macro virus" before responding to this question.)
Instructions
Formulate a plan for counteracting the attack.
What might be some possible solutions?
What is your approach?
Begin your answer by explaining what a macro virus is. Then, explain what you would do if that e-mail came from a colleague and you absolutely needed to view the file. Finally explain what you would do if you the e-mail was unsolicited (you don't know the person it came from).
Submitting your exercise
Enter your answer into the text box below. Click the
Submit
button to submit your plan for review.
Submit