What is system hardening

Assignment Help Computer Engineering
Reference no: EM13708776

Answer the following questions and also justify your answers with appropriate examples

Question 1: Windows Task Manager and Windows Computer Manager both provide information about system services. Compare and contrast the types of information (about system services) that can be obtained from these tools.

Question 2: Describe how you could use one or more of the Windows log files to investigate a potential malware infection on a system.

 - What types of information are available to you in your chosen log file?

Question 3: Should you filter log files during an investigation into a security incident? Why or why not?

Question 4: Should remote desktop services be enabled on employee workstations for use by IT Help Desk personnel? Why or why not?

Question 5: What is system hardening? Explain the relationship between system hardening and the removal or mitigation of vulnerabilities.

Question 6: What resources are available on the Internet to help system administrators determine how to harden a Windows Server 2008? Windows 7 workstation?

Question 7: How does Microsoft Baseline Security Analyzer (MBSA) differ from Windows Update? Why are Shares a source of system vulnerabilities?

Question 8: What did the Nessus scan report tell you about vulnerabilities on the network segment that was scanned?

Question 9: After an incident responder has finished gathering information about a security incident, what should be the next step(s)?

Reference no: EM13708776

Questions Cloud

Determine the concentration of each of the individual ions : Question- Ba(OH)2 is a strong electrolyte. Determine the concentration of each of the individual ions in a 0.250 M Ba(OH)2 solution.
Explain the balloon rises in the atmosphere to an altitude : Question- A weather balloon is inflated to a volume of 26.2L at a pressure of 754mmHg and a temperature of 28.0?C. The balloon rises in the atmosphere to an altitude where the pressure is 365mmHg and the temperature is -16.2?C.
Write a method that takes a string as input and returns : Write a method that takes a String as input and returns the reverse of that String. Then write a second method that uses the first method to test whether or not an input String is a palindrome.
How much na2so4 solution must be added to initiate : Question- A 1.0M Na2SO4 solution is slowly added to 10.0 mL of a solution that is 0.20M in Ca2+ and 0.30M in Ag+. How much Na2SO4 solution must be added to initiate the precipitation
What is system hardening : What is system hardening? Explain the relationship between system hardening and the removal or mitigation of vulnerabilities - What resources are available on the Internet to help system administrators determine how to harden a Windows Server 2008? ..
What is the product formed when excess aqueous naoh : Question- What is the product formed when excess aqueous NaOH is added to a solution containing each of the following ions
Evaluate the total with insurance : Enter the insurance rate as a mixed cell reference in the formula, making the row number absolute.
Define what is the specific heat for the metal : Question- It takes 45.0JJ to raise the temperature of an 9.00gg piece of unknown metal from 13.0C to 24.0C. What is the specific heat for the meta
Explain what makes the use of hydrogenated fat problematic : Question- On the topic of hydrogenation: Why are we using hydrogenated oils and fats in our food? What makes the use of hydrogenated fat problematic

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd