information security

I’m trying to study for my Computer Science course and I need some help to understand this question.

Quiz Questions

Part 1: True/False – Multiple Choice answers (2 Points Each)

Answer: ____

Answer: ____

Answer: ____

Answer: ____

Answer: ____

Answer: ____

Administrators should perform the following steps to harden and securely configure a server OS.

  • Remove unnecessary services, applications, and network protocols.
  • Configure OS user authentication.
  • Configure resource controls appropriately.

Answer: ____

The Windows 10 defense stack includes: Device protection, Threat resistance, Identity protection, information protection, Breach detection investigation & response.

Answer: ____

Desktops are most often virtualized on computers with bare metal virtualization.Servers are most often virtualized on computers with hosted virtualization.

Answer: ____

A virtual machine has less layers than a native OS-based machine and so it has no potential for any vulnerabilities and no security problems.

Answer: ____

Part 2: Short Answers (10 points each). Please answer briefly and completely and cite all sources of information. Please restrict your answer for each question to one (1) page (double spaced) or less.

  • Briefly explain the steps to harden and securely configure a server OS.
  1. Briefly explain what a buffer overflow is and how it is mitigated.
  2. Briefly describe these different malware types: Virus, Trojan horse, worm, adware, spyware, bot and rootkit.Provide an example of how each one is mitigated.
 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

If this is not the paper you were searching for, you can order your 100% plagiarism free, professional written paper now!

Order Now Just Browsing

All of our assignments are originally produced, unique, and free of plagiarism.

Free Revisions Plagiarism Free 24x7 Support
Posted in Uncategorized