Malware consists of unwanted programs like Trojans and viruses. Signs of malware include degraded

system performance, unusual services and network traffic, altered or removed system logs, missing or

inactive anti-virus, and any number of application anomalies. Trojans and viruses impact all three tenets of

information systems security.
Identify and describe three techniques used in the lab to defend against malware. Describe some

advantages and disadvantages of each.
Enabled on the network and properly configured, a firewall can block outside sources from being able to

insert malware and viruses. By default, the Windows Firewall disables several important services like File

Transfer Protocol (FTP) and Internet Control Message Protocol (ICMP), both of which use the Ping

command.
Explain why enabling these default settings is significant to network security. Elaborate on what can

happen if they are left disabled.
Pick one of the following defense layers and provide descriptions (including how they work) of two

controls or countermeasures that can be effectively used within it.
Perimeter.
Network.
Host.
Application.
Data.
Physical.

Sample Solution

This question has been answered.

Get Answer