please check the three questions that i have
Get perfect grades by consistently using www.college-experts.com. Place your order and get a quality paper today. Take advantage of our current 20% discount by using the coupon code GET20
Order a Similar Paper Order a Different Paper
( Question 1) Securing an Operating System
You are a security administrator responsible for providing secure configuration requirements for new laptop deployments. After reading Module 2 of Certified Secure Computer User v2exercises, apply the configuration settings below on your Windows® or Mac® computer and take screenshots of each step:
Windows:
- Lock system when not in use
- Create and change user account password
- Disable Guest Account
- Enable Automatic Software Updates
- Enable Firewall
- Create a New Firewall Rule
- Turn on Windows Defender
- Enable bitlocker
- Decrypt file using EFS
- Disable Unnecessary Services
Mac:
- Lock system when not in use
- Disable Automatic Login
- Enable Automatic Software updates
- Disable Guest Account
- Enable FileVault
- Enable Firewall
- Change Password at set intervals
- Enable and set parental controls
Paste screenshots into a Microsoft® Word document to demonstrate you applied the configurations.
Write a 1-page explanation on how and why these settings create a secure operating system.
Question 2) Configuring Anti-Virus Software
You are a security analyst at a large Security Operations Center (SOC). Malware infections have noticeably increased, and all the impacted machines did not have updated anti-virus signatures. Your task is to set the anti-virus software to secure your company’s computers.
Note: Module 3 of Certified Secure Computer User details two options for anti-virus protection, Kaspersky and Avast anti-virus software.
Choose one of the following two options:
Option 1 (choose this option if you do not have Kaspersky or Avast anti-virus software on your machine):
- Follow the directions given in Module 3 to install and configure Kaspersky or Avast anti-virus software on your machine.
- Verify that virus definitions are current. Take a screenshot.
- Run a scan of your machine. Take a screenshot of the results.
- Paste screenshots into a Microsoft® Word document to demonstrate you applied appropriate configurations and definitions are current.
Option 2 (choose this option if you already have anti-virus software installed on your machine):
- Verify that virus definitions are current. Take a screenshot.
- Run a scan of your machine. Take a screenshot of the results.
- Paste screenshots into a Microsoft® Word document to demonstrate you applied appropriate configurations and definitions are current
( Question 3) Run/Playbook Part 1: Malware
Create the first section of your Playbook/Runbook.
This week you researched malware, attack vectors, and how they are related to cybersecurity.
Write a 1- to 2-page scenario in which a malware attack occurs. Include the following:
- Detail the particular malware, the exploited vulnerability, and its attack vector in your scenario.
- Provide a prescriptive series of steps you would utilize to deal with and mitigate the attack.
Do you need help with this or a different assignment? We offer CONFIDENTIAL, ORIGINAL (Turnitin/LopesWrite/SafeAssign checks), and PRIVATE services using latest (within 5 years) peer-reviewed articles. Kindly click on ORDER NOW to receive an A++ paper from our masters- and PhD writers.
Get a 15% discount on your order using the following coupon code SAVE15
Order a Similar Paper Order a Different Paper