Network Devices - Quiz
Nature Purpose Protocols
TCP/IP Address Classifications
Purpose Subnet Masks
Emai Name Protocols
What is Telnet
Detect Security Breaches
Network Security Threats
Counteracting Attacks - Exercise
Protecting against attacks
Demonstrate understanding of the core competencies to counteract malicious attacks on a system.
This exercise is worth a total of 5 points. To receive full credit, you will need to answer the question below in as complete detail as possible. Once you have completed your answer you will submit your answer.
One day you walk in to your office, sit down at your "space," log on to your computer, and start reading your new email. One particular email has an attachment. When you attempt to open the attachment your virus software displays the following message:
VIRUS WARNING: The following file contains a macro.
Remove the macro (Y/N)?
What would you do? (You may want to search the Internet, using the keyword "macro virus" before responding to this question.)
Formulate a plan for counteracting the attack.
What might be some possible solutions?
What is your approach?
Begin your answer by explaining what a macro virus is. Then, explain what you would do if that e-mail came from a colleague and you absolutely needed to view the file. Finally explain what you would do if you the e-mail was unsolicited (you don't know the person it came from).
Submitting your exercise
Enter your answer into the text box below. Click the
button to submit your plan for review.