Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Find Unauthorized Files Scenario During this portion of the lab, you will be introduced to the ability to manually scan your workstation for new files

Find "Unauthorized" Files
Scenario
During this portion of the lab, you will be introduced to the ability to manually scan your workstation for new files and changes to files already in the baseline.
Find the Mystery Files.zip file in C:\Temp and extract its contents to the desktop. Then, verify there are six files within the Suspicious folder.
Next, and similar to before, generate MD5 hashes for the six "suspicious" files we just extracted. Then, generate SHA256 hashes for them as well.
Lastly, generate MD5 hashes for all files in the C:\ drive to find which files have changed in the background. You should be able to run a command to only show or output the hashes of files that have changed or been added to the system. This is to illustrate that operating systems do have a fair amount of dynamic change when they are used.
What do you find?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Graph Database Modeling With Neo4j

Authors: Ajit Singh

2nd Edition

B0BDWT2XLR, 979-8351798783

More Books

Students also viewed these Databases questions

Question

1. Identify what positions are included in the plan.

Answered: 1 week ago

Question

2. Identify the employees who are included in the plan.

Answered: 1 week ago

Question

7. Discuss the implications of a skill-based pay plan for training.

Answered: 1 week ago