Lab 9 Essay

516 Words3 Pages
Task 1: Procedure 1. Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Locate an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zonelabs Zone-Alarm firewall is an example of a software firewall. Task 2: Procedure 1. By 2010 the number of different known viruses numbered over 4 million. Many companies produce anti-virus programs to help protect your computer against these threats. Some of the companies are Panda, Norton, McAfee, AVG, and Kaspersky. Which of these companies provide free versions of their software? Which ones provide trial versions? 2. Viruses and other malicious code infect a computer in one of several different ways, such as through downloaded Trojan horse programs, malicious email attachments, and drive-bydownloads. What does each of these terms mean and how do these types of infections take place? Task 3: Procedure 1. Three types of backups processes are full backup, differential backup, and incremental backup. What are the differences between each type of backup? 2. For safety, backups should be stored off-site and periodically tested. Why? 3. Backups provide a copy of critical data in case of an emergency. But hardware can fail too, resulting in the need for hardware backup. This is a critical part of any business’ disaster recovery plan. Three ways to provide hardware backup are through cold sites, warm sites, and hot sites. What is the difference between these three sites and which is the most expensive to maintain? 3 Task 4: Procedure 1. Passwords are one way a user authenticates him- or herself to a computer. Passwords should be kept secret (not written down but memorized) and be difficult to guess. Children’s names, colors, birth
Open Document