Welcome to Assignments Writing

Your Trusted Partner in Term Paper Writing

At Assignments Writing, we’re a team of passionate educators and skilled writers committed to supporting students in their academic journey.

CYB 205 UOPX Antivirus and NMAP Scans Lab Report

CYB 205 UOPX Antivirus and NMAP Scans Lab Report


1. Default Windows Firewall and Security Settings: The default Windows firewall and security settings can contribute to the inability to detect an attacker probing from inside the network due to their limited scope and the fact that they are primarily designed to protect against external threats. By default, Windows Firewall typically allows outbound traffic while blocking only incoming connections that are not explicitly allowed. This approach assumes that internal network traffic is trusted, making it easier for an attacker who gains access to the network to remain unnoticed. Additionally, default security settings may not provide advanced threat detection and prevention mechanisms that are necessary to detect subtle and sophisticated attacks. Attackers often exploit these weaknesses, remaining undetected for extended periods.

2. Scaling to 100 Computers or an Enterprise with 10,000 Computers: Scaling the process of network security monitoring to 100 computers or an enterprise with 10,000 computers on their LAN/WAN significantly complicates the task. Managing and monitoring the security of a larger network requires a dedicated team and advanced security solutions. The challenges include:

  • Visibility: With a larger network, gaining visibility into all systems and network traffic becomes increasingly difficult. Monitoring and analyzing traffic from numerous endpoints and subnets demand more sophisticated tools and resources.
  • Network Complexity: As the number of computers increases, so does the complexity of the network architecture. It becomes challenging to maintain consistent security policies and configurations across all devices.
  • Scalability: Traditional antivirus and network scanning tools may struggle to keep up with the volume of traffic and endpoints in larger environments. It may require more robust and scalable security solutions.
  • Incident Response: Detecting breaches on a large scale is a daunting task. An incident response plan must be well-defined, and the team must be equipped to handle incidents promptly.

3. Challenges and Advantages in a Cloud-hosted IaaS Environment: In a cloud-hosted Infrastructure as a Service (IaaS) environment with regularly added internet-accessible systems, there are both advantages and challenges in protecting against malware and attacks:

  • Advantages:
    • Scalability: Cloud environments can quickly scale resources up or down based on demand. This flexibility can help deploy security measures as needed.
    • Automation: Cloud environments allow for the automation of security tasks, making it easier to apply consistent security policies and configurations across instances.
    • Security Services: Cloud providers often offer a range of security services and tools, such as identity and access management, DDoS protection, and intrusion detection, which can enhance security.
  • Challenges:
    • Visibility: Cloud environments can be complex, and it may be challenging to maintain complete visibility into all resources and network traffic.
    • Dynamic Nature: The dynamic nature of cloud environments, with resources being provisioned and de-provisioned frequently, can make it harder to keep security configurations up to date.
    • Shared Responsibility Model: Cloud security is a shared responsibility between the cloud provider and the customer. Misconfigurations by the customer can lead to vulnerabilities.

4. Use of Tools by Infrastructure Administrators to Secure an Environment: Infrastructure administrators can use the tools demonstrated in this lab to enhance security in the following ways:

  • Network Scanning: Regularly perform network scans using tools like Nmap to identify open ports, vulnerabilities, and potential security weaknesses. This helps administrators proactively address security issues.
  • Antivirus Software: Install and maintain robust antivirus software on all systems to detect and remove malware. Ensure that antivirus definitions are up to date to defend against the latest threats.
  • Firewalls: Configure and monitor firewalls to restrict unnecessary network traffic and prevent unauthorized access. Implement intrusion detection and prevention systems to monitor for suspicious activities.
  • Logging and Monitoring: Use logging and monitoring tools to collect and analyze network and system logs. This helps in identifying and responding to security incidents promptly.
  • Patch Management: Keep all systems and software up to date with the latest security patches. Vulnerability scanners can assist in identifying systems that require updates.
  • User Education: Educate users about best practices for cybersecurity, including avoiding suspicious links and attachments and practicing good password hygiene.

By effectively utilizing these tools and best practices, infrastructure administrators can significantly improve the security posture of their environments and better defend against potential threats.

CYB 205 UOPX Antivirus and NMAP Scans Lab Report





Complete the Practice Lab titled “AntiVirus and NMAP Scans.”

Capture screenshots taken during the lab in a Microsoft® Word document as specified within the lab instructions.

At the end of the lab, you will be asked to respond to the following in a 2- to 2.5-page response at the end of your Microsoft® Word document:

  • Most network breaches go undetected for weeks or even months, and an attacker usually takes steps to be much more careful than our scans were. With that in mind, write a short paragraph describing how the default Windows® firewall and security settings might contribute to this inability to detect an attacker probing from inside your network.
  • This was just a single system on a local LAN. How much more complicated would this process be for 100 computers? What about an enterprise with 10,000 computers on their LAN/WAN?
  • Consider a cloud-hosted Infrastructure as a Service (IaaS) environment with many new, internet-accessible systems regularly being built and brought online. What advantages or challenges might there be protecting such systems from malware and from attack?
  • Finally, conclude this week’s assignment with a page explaining how the same types of tools demonstrated in this lab might be used by an infrastructure administrator to help secure an environment.


Place Your Order Here

Our Service Charter

1. Professional & Expert Writers: We only hire the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of master’s and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. We are known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: We have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.

Format & Features

Our Advantages

How It Works

1. Fill Order Form
2. Make payment
3. Writing process
4. Download paper

Fill in the order form and submit all your files, including instructions, rubrics, and other information given to you by your instructor.

Once you complete filling the forms, complete your payment. We will get the order and assign it to a writer.

When your order is completed, it’s assigned to an editor for approval. The editor approves the order.

Once approved, we will upload the order to your account for you to download.  You can rate your writer or give your customer review.

What Clients Said


I am very satisfied! thank you for the quick turnaround. I am very satisfied! thank you for the quick turnaround.I am very satisfied! thank you for the quick turnaround.

Mercy M

I am very satisfied! thank you for the quick turnaround. I am very satisfied! thank you for the quick turnaround.I am very satisfied! thank you for the quick turnaround.

Jane L

I am very satisfied! thank you for the quick turnaround. I am very satisfied! thank you for the quick turnaround.I am very satisfied! thank you for the quick turnaround.

Rayan M


We are a freelance academic writing company geared towards provision of high quality academic papers to students worldwide.

Open chat
Scan the code
Can we help you?