Monday, March 4, 2019
Five types of system information Essay
List five types of system information that canful be obtained from the Windows Task Manager? How can you use this information to confirm the strawman of malw are on a system? (Hint Look at the bandwidth and CPU utilization.) Services, Performance, applications, processes, networking, users. You can use it to see if there are either unidentified processes macrocosm run in the can ground without your knowledge.Windows Task Manager and Windows figurer Manager both provide information round system services. liken and contrast the types of information (about system services) that can be obtained from these tools.Task passenger vehicle shows what programs are running currently along with any active back ground low-keyware. While com regulariseer management shows us ALL of the soft and hard ware that is operational on the com displaceer at any given time active or not. Explain how you could use wholeness or more of the Windows log files to investigate a potential malware transmi tting on a system. What types of information are available to you in your elect log file? You can use the log files to ID malware form the incidence logs. They should tell you when something was downloaded or uploaded to the computer. If you know some minor details about what it is you are looking for then you should be able to ID the malware file that was put on the computer.Should you imbue log files during an investigation into a certification resultant? why or why not? No you shouldnt filter anything unless you are sure you know what you are looking for. There is no telling what might me important when you are searching for a virus. Should impertinent desktop services be enabled on employee workstations for use by IT attend Desk personnel? Why or why not? Yes they should this will cease the IT staff to be able to interface with a potential curse when dealing with malware. It must however be used responsibly when dealing with Remote access.How does Microsoft Baseline Sec urity Analyzer (MBSA) differ from Windows Update? Why are Shares a source of system vulnerabilities? MBSA is easer to use and helps IT professionalsdetermine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance. Windows update focuses mostly un driver updates. Shares are a sources of system vulnerability because infected material can be easily passed on through them. Shares are not suggested in a business setting unless the information put in them is guaranteed clean.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.