Provide a list of Anti-Malware alternatives—include at least four antivirus and two antispyware products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer. Antivirus: a. Bit Defender b. Avast Free Antivirus c. AVG Free Antivirus d. Kaspersky Antivirus Anti-Spyware: a. Microsoft WINDOWS DEFENDER b. Spyware 2. Ensuring anti-malware software and data is up to date.
LAB 1-4 Questions 1. What is the current screen resolution? 1366 x 768 2. What security advantages does displaying the login screen on resume offer? It offers security from anyone one trying to gain access to your computer.
• Needs to be installed before boot or error messages are generated. Mouse: • Again USB, PS/2 on older motherboards. • Watch for resource conflicts (IRQ) on older devices. Bar Code Reader: • Used in retail businesses. Biometric: • Fingerprint reader/retinal scanner.
Chkdsk: This tool checks the integrity of the harddrives in your machine this tool can check and correct errors found on the local harddrive. The tool can be launched from a command prompt by opening the command prompt and typing in chkdsk. Chkdsk has many options such as chkdsk /f. This command will fix the errors found when you run just the standard chkdsk this only report the status of the harddrive. Next tool on our list is the disk defragmenter tool.
The current configuration has several Conos servers placed around the regions. These servers are accessed by the onsite personnel for report gathering. The purchase of these licenses give report writers access to run build reports on a remote Conos server located at 1 center. Reduction of 6 Conos servers. • Guardian Edge Encryption Software and licenses – In an effort to keep data secure at each Region there is a requirement to purchase approved encryption software.
Secure the Telecommuters computers before they are distributed. Use data encryption for customer data. | | Telecommuters try to repair or troubleshoot their own computers instead of calling technical support or taking the computer in for service. | Computers become inoperable and job duties can’t be performed or are late. | H | H | Require employees come to the office to complete work and turn in computers to IT for repair | Phoebe | Require computers with performance issues to be brought into the IT department, or configure remote desktop for routine maintenance at regular intervals.
What file utility is used to check a drive for errors? Answer: CHKDSK.exe Chapter 10 19. Authenticating users based on their physical features is done using _________. Answer: Biometrics 20. What software is protected against viruses and malware?
This adds new security holes and threats. In this company I would use administrative, hardware and software controls. I would add hardware controls to make this a more complexly layered protection plan specifically for the mobile smartphone communications. As an administrator I would want to make sure the mobile users are communicating to business related material on the business server securely and from company the given smartphones. 3.
A biometric control is an automated method of verifying the identity of a person, based on physical or behavioral characteristics. Biometrics consists of thumbprint or fingerprint, retinal scan, voice scan or signature. Biometric controls are now integrated into many e-business hardware and software products. Network access control (NAC) products. NAC tools are different from traditional security technologies and practices that focus on file access.
Communication Proposal and Presentation Sabrina Hunter ENG/135 August 24, 2015 DR. Franklin Communication Proposal and Presentation Firewall System A firewall is a software that stands between your computer and the internet. Having a properly functioning firewall can stop potential threats affecting your computer, but it can also alert you when a problem is occurring as well. Having a firewall can save you and your business from having to spend extra money to get rid of a virus on your computer or becoming a victim by having your computer being a hack. By having a firewall, it stands between your computer and the internet it serves to block unauthorized request passing through your system. The firewall also serves as a packet filter.