1. What is the main difference between a virus and a Trojan?
2. A virus or malware can impact which of the three tenets of information systems security (CIA)? Describe how it impacts it as well.
3. Once a malicious fi le is found on your computer, what are the default settings for USB/removable device scanning? What should an organization do regarding use of USB hard drives and slots on existing
computers and devices?
4. Why is it recommended to do an anti-virus signature fi le update before performing an anti-virus scan on your computer?
5. When sending a fi le, a user asks you to zip it and encrypt the fi le, if possible. Why would this be?
6. You receive an e-mail regarding a link from one of your friends for some special documents. Shortly after that you receive the same e-mail from three other friends and the e-mails are not being blocked. What is the likely cause?
7. Specify a setting you would want to turn on if you were running AVG on your system to improve the quality of scans you do on the system.
8. Your employees e-mail fi le attachments to each other and externally through the organization’s fi rewall
and Internet connection. What security countermeasures can you implement to help mitigate the risk of
rogue e-mail attachments and URL Web links?
9. What are typical indicators that your computer system is compromised?
10. What elements are needed in a workstation domain policy regarding use of anti-virus and malicious software prevention tools?
Need Solution https://gum.co/jTMb
2. A virus or malware can impact which of the three tenets of information systems security (CIA)? Describe how it impacts it as well.
3. Once a malicious fi le is found on your computer, what are the default settings for USB/removable device scanning? What should an organization do regarding use of USB hard drives and slots on existing
computers and devices?
4. Why is it recommended to do an anti-virus signature fi le update before performing an anti-virus scan on your computer?
5. When sending a fi le, a user asks you to zip it and encrypt the fi le, if possible. Why would this be?
6. You receive an e-mail regarding a link from one of your friends for some special documents. Shortly after that you receive the same e-mail from three other friends and the e-mails are not being blocked. What is the likely cause?
7. Specify a setting you would want to turn on if you were running AVG on your system to improve the quality of scans you do on the system.
8. Your employees e-mail fi le attachments to each other and externally through the organization’s fi rewall
and Internet connection. What security countermeasures can you implement to help mitigate the risk of
rogue e-mail attachments and URL Web links?
9. What are typical indicators that your computer system is compromised?
10. What elements are needed in a workstation domain policy regarding use of anti-virus and malicious software prevention tools?
Need Solution https://gum.co/jTMb