Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
1st Edition
ISBN: 9781305657458
Author: Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 9, Problem 1CTQ
Program Plan Intro
- OS is the term that acts as an interface between the hardware and the user.
- OS does basic operations such as getting input from the keyboard, displaying output in the monitor and monitoring the files.
Windows OS tools:
- Firewall
- It monitors and controls the traffic on network in the system.
- It acts as a barrier between the system and unauthorized users.
- Antivirus software
- It is used for identifying, preventing and deleting the errors in the system.
- Spyware
- It helps the unauthorized users like hacker to get access to the system.
- Malware detection software
- It is used for identifying, preventing and deleting the malware present in the system.
- Automatic updating
- It helps in updating the software without including the user permission.
Explanation of Solution
Security concerns related to built-in OS tools:
“Yes” the built-in OS tools include the security concerns.
Reason:
Window...
Explanation of Solution
Alternatives:
- Encryption
- Encryption is the term used to define the process which helps protect the unauthorized access to data.
- The data is hidden using some mathematical
algorithms. - It helps to protect data during transmission of data over a network and the data stored in
databases are protected.
- Authentication
- Authentication sequence or digital signatures are used in securing many financial transactions...
Explanation of Solution
Disability of Windows tool:
“Yes”, the Windows tool must be disabled in terms of risk.
Reason:
- The unauthorized access can be avoided by disabling the Windows tool...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Unable to Configure Windows Update
You have recently hired a server administrator to help maintain your servers and desktops in your Windows domain. She was working with a desktop computer and found that she couldn’t configure Windows Update. Write a memo explaining why she was unable to configure Windows Update and point out four advantages of using WSUS.
A security flaw has been discovered in server software that is critical to your organization. A patch is available from the vendor. What should you do next?
a. Stop using the software.
b. Turn off the server.
c. Disconnect all users and update the software immediately.
d. Update the software during non-business hours.
Susan has recently noticed pop-up advertisements on her work computer while using a particular browser. What would be the most comprehensive tool that a desktop technician could suggest to protect her computer?
a. Install antimalware software.
b. Use a different browser.
c. Install antivirus software.
d. Enable the pop-up blocker in the browser.
I need help with the first Response to a Computer Incident
1. You are responding with others to the scene of a computer incident. You are theone responsible for the computers at the scene. The target system (only one) is ina business. The screen is locked, with the operating system logo displayed as Windows2008 Server. The prompt explains that the computer is locked and that onlythe administrator can unlock it. The system administrator is available and is not thetarget of the investigation, and she is considered a person with high integrity who iswilling to assist.2. tell in detail how you would take down this machine and take it to the lab forimaging if the Enterprise, FIM 6, Portable, or EnCase 7 version is not an option and ifyour directive is to seize it and take it to the lab.3. Jot down your narrative as though it were going to be included in your report. Be sureto describe your shutdown methodology and reasoning. Include details sufficient toestablish the complete chain of…
Chapter 9 Solutions
Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
Ch. 9 - Prob. 1SGCh. 9 - Prob. 2SGCh. 9 - Prob. 3SGCh. 9 - Prob. 4SGCh. 9 - Prob. 5SGCh. 9 - Prob. 6SGCh. 9 - Prob. 7SGCh. 9 - Prob. 8SGCh. 9 - Prob. 9SGCh. 9 - Prob. 10SG
Ch. 9 - Prob. 11SGCh. 9 - Prob. 12SGCh. 9 - Prob. 13SGCh. 9 - Prob. 14SGCh. 9 - Prob. 15SGCh. 9 - Prob. 16SGCh. 9 - Prob. 17SGCh. 9 - Prob. 18SGCh. 9 - Prob. 19SGCh. 9 - Prob. 20SGCh. 9 - Prob. 21SGCh. 9 - Prob. 22SGCh. 9 - Prob. 23SGCh. 9 - Prob. 24SGCh. 9 - Prob. 25SGCh. 9 - Prob. 26SGCh. 9 - Prob. 27SGCh. 9 - Prob. 28SGCh. 9 - Prob. 29SGCh. 9 - Prob. 30SGCh. 9 - Prob. 31SGCh. 9 - Prob. 32SGCh. 9 - Prob. 33SGCh. 9 - Prob. 34SGCh. 9 - Prob. 35SGCh. 9 - Prob. 36SGCh. 9 - Prob. 37SGCh. 9 - Prob. 38SGCh. 9 - Prob. 39SGCh. 9 - Prob. 40SGCh. 9 - Prob. 41SGCh. 9 - Prob. 42SGCh. 9 - Prob. 43SGCh. 9 - Prob. 44SGCh. 9 - Prob. 45SGCh. 9 - Prob. 46SGCh. 9 - Prob. 47SGCh. 9 - Prob. 48SGCh. 9 - Prob. 49SGCh. 9 - Prob. 1TFCh. 9 - Prob. 2TFCh. 9 - Prob. 3TFCh. 9 - Most users today work with a command-line...Ch. 9 - Prob. 5TFCh. 9 - Prob. 6TFCh. 9 - Prob. 7TFCh. 9 - Prob. 8TFCh. 9 - Many of the first operating systems were device...Ch. 9 - Prob. 10TFCh. 9 - Prob. 11TFCh. 9 - Prob. 12TFCh. 9 - Prob. 1MCCh. 9 - Prob. 2MCCh. 9 - Prob. 3MCCh. 9 - A _____operating system allows two or more...Ch. 9 - Prob. 5MCCh. 9 - Prob. 6MCCh. 9 - Prob. 7MCCh. 9 - Prob. 8MCCh. 9 - firmware a. operating system problem that occurs...Ch. 9 - Prob. 2MCh. 9 - thrashing a. operating system problem that occurs...Ch. 9 - Prob. 4MCh. 9 - drive a. operating system problem that occurs when...Ch. 9 - Prob. 6MCh. 9 - Prob. 7MCh. 9 - Prob. 8MCh. 9 - icons a. operating system problem that occurs when...Ch. 9 - Prob. 10MCh. 9 - Prob. 2CTCh. 9 - Prob. 3CTCh. 9 - Prob. 4CTCh. 9 - What is a cross-platform application?Ch. 9 - Prob. 6CTCh. 9 - Prob. 7CTCh. 9 - Prob. 8CTCh. 9 - Prob. 9CTCh. 9 - Prob. 10CTCh. 9 - Prob. 11CTCh. 9 - Prob. 12CTCh. 9 - Prob. 13CTCh. 9 - Prob. 14CTCh. 9 - Prob. 15CTCh. 9 - Prob. 16CTCh. 9 - Prob. 17CTCh. 9 - Prob. 18CTCh. 9 - Prob. 19CTCh. 9 - Prob. 20CTCh. 9 - Prob. 21CTCh. 9 - Prob. 22CTCh. 9 - Prob. 23CTCh. 9 - Prob. 24CTCh. 9 - Prob. 25CTCh. 9 - Prob. 26CTCh. 9 - Prob. 27CTCh. 9 - Prob. 28CTCh. 9 - Prob. 29CTCh. 9 - Prob. 1PSCh. 9 - Prob. 2PSCh. 9 - Prob. 3PSCh. 9 - Prob. 4PSCh. 9 - Prob. 5PSCh. 9 - Prob. 6PSCh. 9 - Prob. 7PSCh. 9 - Prob. 8PSCh. 9 - Prob. 9PSCh. 9 - Prob. 10PSCh. 9 - Prob. 11PSCh. 9 - Prob. 1.1ECh. 9 - Prob. 1.2ECh. 9 - Prob. 1.3ECh. 9 - Prob. 2.1ECh. 9 - Prob. 2.2ECh. 9 - Prob. 2.3ECh. 9 - Prob. 3.1ECh. 9 - Prob. 3.2ECh. 9 - Prob. 3.3ECh. 9 - Prob. 4.1ECh. 9 - Prob. 4.2ECh. 9 - Prob. 4.3ECh. 9 - Prob. 5.1ECh. 9 - Prob. 5.2ECh. 9 - Prob. 5.3ECh. 9 - Prob. 1IRCh. 9 - Prob. 2IRCh. 9 - Prob. 3IRCh. 9 - Prob. 4IRCh. 9 - Prob. 5IRCh. 9 - Prob. 1CTQCh. 9 - Prob. 2CTQCh. 9 - Prob. 4CTQ
Knowledge Booster
Similar questions
- Computer Security As an experienced networking professional, you are asked to conduct a posture assessment on a local credit union’s network. The credit union currently has two locations, a headquarters office downtown and a branch office on the east side of town. The headquarters has the following equipment: Ten Windows XP and ten Windows 7 workstations, connected to a Windows Server2008 R2 file server● One Windows Server 2008 R2 RRAS server accessed by home workers after hours● One Windows Server 2008 R2 print server● One Linux database server One Apache Web server for members to check their account balances online One firewall where the network connects to the credit union’s ISP via a T3 dedicated linkThe east-side office has five Windows 7 workstations, connected to the headquarters officeWindows Server 2008 R2 server through a T1 link. At the headquarters, the servers reside in a locked room that admits authorized users withan electronic badge access system. Both…arrow_forwardimplementing NAP using different types of enforcement points.NAP or Network Access Protection is a Windows Server security mechanism, which enables you to control how computers gain access to network resources. The main functionality of NAP is to verify and ensure that only healthy computers will be marked as compliant and will receive network access. As a Technology Specialist, you have been tasked with automatically bringing client computers into compliance by using Network Policy Server, creating client compliance policies and configuring a NAP server to check computers’ current health. There are four main enforcement types available with NAP as follows: IPsec, DHCP, VPN and 802.1X. Within a network you can configure one or multiple enforcement types and these technologies should be chosen according to the network’s infrastructure and requirements. In you project you need to discuss the enforcement technologies available with NAP and you are asked to implement at least 2 enforcement…arrow_forwardIs there anything you would do if a virus compromised your mobile device? Find out what kind of harmful software is causing issues. Describe what you did to get rid of the infection on your computer. If you're having trouble tracking down information on mobile malware, you're welcome to experiment on your own and share your findings.arrow_forward
- Enormous Financial Corporation has thousands of computers running Windows 10. Many of these are at the head office, but thousands of mobile computers also are used by salespeople outside the office. Many of the salespeople are independent and never come into the office; therefore, they can't be joined to the domain and managed by the standard tools. To install software on these computers, you send the individual users instructions on how to download and install the apps. This is a time-consuming and error-prone process. How can cloud services could be used to improve management of the mobile computers?arrow_forwardWindows Server 2012 configuration and installation practices in a business may be controversial.arrow_forwardoperating systems considered the platform for all devices connected to the internet. some types of operating systems provides maximum level of security. on other hand some other (OS) have weakness against attacks -discuss the operating systems security how they have different security enforcement -what are the differences in techniques used to provide security and stability ? -what your recommended for different type of servers and hosts ?arrow_forward
- During working hours, you and your buddy often play a well-known online game. The virus that recently infected your friend's PC was found to have originated from a website that also included malware. Your acquaintance informed you that after clicking on a link while playing a game on her computer, a lot of the software on her system abruptly ceased to function. Describe three (three) dangers and provide solutions.arrow_forwardTopic 1 Research at least 3 off-the-shelf solutions for backing up a Windows Server operating system. You may select an imaging solution as one of your options. Discuss the pros and cons of the 2 different solutions. You should include cost, security, and recovery in your discussion. Topic 2 What are some advantages of using an off-the-shelf solution versus using the built-in Microsoft backup software? What are some disadvantages of using an off-the-shelf solution versus using the built-in Microsoft backup software?arrow_forwardAngloGold Ashanti's System Administrator. Your server has been performing poorly for some time now. Hundreds of programs have been deleted or stopped since you discovered the problem. AngloGold can help you avoid or get rid of these issues, so your servers can remain working properly?arrow_forward
- Explain the steps to configure Windows Remote Desktop for secure access to a remote computer.arrow_forwardTake a new smartphone and be excited about the apps available. You read about a great new phone game. You do a fast Web search and find it on one of the free markets. This app's access rights are requested when you download and install it. It asks to “Send SMS messages” and “Access your address book”. Should you suspect a game asking for these permissions? What risk does the app offer to your phone if you grant it these rights and install it? What kind of malware is it?arrow_forwardExplain the potential risks of modifying the Windows Registry and how to back up and restore it.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningMicrosoft Windows 10 Comprehensive 2019Computer ScienceISBN:9780357392607Author:FREUNDPublisher:Cengage
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Microsoft Windows 10 Comprehensive 2019
Computer Science
ISBN:9780357392607
Author:FREUND
Publisher:Cengage