You will get email Reply within few hours

Friday, 26 April 2013

It 255 Lab 9 Solution

1. What is the main difference between a virus and a Trojan?

2. A virus or malware can impact which of the three tenets of information systems security (CIA)? Describe how it impacts it as well.

3. Once a malicious fi le is found on your computer, what are the default settings for USB/removable device scanning? What should an organization do regarding use of USB hard drives and slots on existing
computers and devices?

4. Why is it recommended to do an anti-virus signature fi le update before performing an anti-virus scan on your computer?

5. When sending a fi le, a user asks you to zip it and encrypt the fi le, if possible. Why would this be?

6. You receive an e-mail regarding a link from one of your friends for some special documents. Shortly after that you receive the same e-mail from three other friends and the e-mails are not being blocked. What is the likely cause?

7. Specify a setting you would want to turn on if you were running AVG on your system to improve the quality of scans you do on the system.

8. Your employees e-mail fi le attachments to each other and externally through the organization’s fi rewall
and Internet connection. What security countermeasures can you implement to help mitigate the risk of
rogue e-mail attachments and URL Web links?

9. What are typical indicators that your computer system is compromised?

10. What elements are needed in a workstation domain policy regarding use of anti-virus and malicious software prevention tools?
Need Solution https://gum.co/jTMb