.

Wednesday, July 17, 2019

Five types of system information Essay

List five types of remains randomness that send away be obtained from the Windows line of work managing director? How can you engagement this in work outation to validate the presence of malw ar on a remains? (Hint Look at the bandwidth and CPU utilization.) Services, Performance, applications, processes, networking, users. You can use it to see if there are any unidentified processes being weather in the back lay down without your goledge.Windows Task Manager and Windows Computer Manager both(prenominal) provide development almost frame services. Compare and contrast the types of information (about system services) that can be obtained from these tools.Task manager shows what programs are running currently on with any ready back ground soft eat. While computer management shows us ALL of the soft and hard ware that is operational on the computer at any given time active or not. Explain how you could use mavin or more of the Windows log shoot downs to examine a potential malware infection on a system. What types of information are get able-bodied to you in your chosen log file? You can use the log files to ID malware form the incidence logs. They should tell you when something was downloaded or uploaded to the computer. If you grapple some minor details about what it is you are looking for then you should be able to ID the malware file that was put on the computer.Should you filter log files during an investigation into a security incident? wherefore or why not? No you shouldnt filter anything unless you are sure you know what you are looking for. There is no telling what might me important when you are searching for a virus. Should remote backcloth services be enabled on employee workstations for use by IT Help Desk personnel? Why or why not? Yes they should this allow for allow the IT staff to be able to interface with a potential little terror when dealing with malware. It must however be used responsibly when dealing with outdo or(a) access.How does Microsoft Baseline Security Analyzer (MBSA) disagree from Windows Update? Why are Shares a source of system vulnerabilities? MBSA is easer to use and helps IT professionals retrieve their security state in union with Microsoft security recommendations and offers specific remediation guidance. Windows update focuses mostly un driver updates. Shares are a sources of system vulnerability because infected poppycock can be easily passed on through them. Shares are not suggested in a business setting unless the information put in them is guaranteed clean.

No comments:

Post a Comment