please check the three questions that i have

Get perfect grades by consistently using www.college-experts.com. Place your order and get a quality paper today. Take advantage of our current 20% discount by using the coupon code GET20


Order a Similar Paper Order a Different Paper

( Question 1) Securing an Operating System

You are a security administrator responsible for providing secure configuration requirements for new laptop deployments. After reading Module 2 of Certified Secure Computer User v2exercises, apply the configuration settings below on your Windows® or Mac® computer and take screenshots of each step:

Windows:

  1. Lock system when not in use
  2. Create and change user account password
  3. Disable Guest Account
  4. Enable Automatic Software Updates
  5. Enable Firewall
  6. Create a New Firewall Rule
  7. Turn on Windows Defender
  8. Enable bitlocker
  9. Decrypt file using EFS
  10. Disable Unnecessary Services

Mac:

  1. Lock system when not in use
  2. Disable Automatic Login
  3. Enable Automatic Software updates
  4. Disable Guest Account
  5. Enable FileVault
  6. Enable Firewall
  7. Change Password at set intervals
  8. Enable and set parental controls

Paste screenshots into a Microsoft® Word document to demonstrate you applied the configurations.

Write a 1-page explanation on how and why these settings create a secure operating system.

Question 2) Configuring Anti-Virus Software

You are a security analyst at a large Security Operations Center (SOC). Malware infections have noticeably increased, and all the impacted machines did not have updated anti-virus signatures. Your task is to set the anti-virus software to secure your company’s computers.

Note: Module 3 of Certified Secure Computer User details two options for anti-virus protection, Kaspersky and Avast anti-virus software.

Choose one of the following two options:

Option 1 (choose this option if you do not have Kaspersky or Avast anti-virus software on your machine):

  • Follow the directions given in Module 3 to install and configure Kaspersky or Avast anti-virus software on your machine.
  • Verify that virus definitions are current. Take a screenshot.
  • Run a scan of your machine. Take a screenshot of the results.
  • Paste screenshots into a Microsoft® Word document to demonstrate you applied appropriate configurations and definitions are current.

Option 2 (choose this option if you already have anti-virus software installed on your machine):

  • Verify that virus definitions are current. Take a screenshot.
  • Run a scan of your machine. Take a screenshot of the results.
  • Paste screenshots into a Microsoft® Word document to demonstrate you applied appropriate configurations and definitions are current

( Question 3) Run/Playbook Part 1: Malware

Create the first section of your Playbook/Runbook.

This week you researched malware, attack vectors, and how they are related to cybersecurity.

Write a 1- to 2-page scenario in which a malware attack occurs. Include the following:

  • Detail the particular malware, the exploited vulnerability, and its attack vector in your scenario.
  • Provide a prescriptive series of steps you would utilize to deal with and mitigate the attack.
Writerbay.net

Do you need help with this or a different assignment? We offer CONFIDENTIAL, ORIGINAL (Turnitin/LopesWrite/SafeAssign checks), and PRIVATE services using latest (within 5 years) peer-reviewed articles. Kindly click on ORDER NOW to receive an A++ paper from our masters- and PhD writers.

Get a 15% discount on your order using the following coupon code SAVE15


Order a Similar Paper Order a Different Paper