Reference no: EM132384683
Assignment: A comparison of existing security controls and settings with one or more baselines helps to validate the correctness of security controls. The process of comparing real computer configurations to known baselines, also called profiling, is important to ensure your configurations are correct and secure.
For each of the following scenarios, select the best tool to profile a Windows computer to determine if it satisfies your security requirements, and write at least 2 pages about these scenario and the tools you selected.
You must select from the following options:
1. Security Configuration and Analysis (SCA)
2. Microsoft Security Baseline Analyzer (MBSA)-Graphical User Interface (GUI)
3. MBSA command-line interface
4. Shavlik NetChk Protect
5. Secunia Security Analyzers
Suspected malware scenarios:
1. You want to schedule a weekly analysis for the Windows servers in your data center. The command should run as a scheduled job and report any available patches for the Windows Server 2012 R2 operating system, Internet information services (IIS) Web server, or structured query language (SQL) server that have not been installed. Which tool would be the best choice?
2. You like the way MBSA presents scan results but you need to scan for vulnerabilities in older Windows products, including Microsoft Office 2000. Which tool provides extended scanning and the ability to use MBSA to view scan reports?
3. Your organization wants to encourage all of its employees and contractors to use vulnerability scanners at home as well as at work. You want to select a single vendor that can provide scanner software products for home and enterprise computers. A single vendor product line can streamline coordinating and analyzing scan results from many different computers. Which set of tools would be the best choice?
4. You have developed several templates that consist of security settings for several types of computers, including desktop workstations, laptops, and various servers. You want to quickly compare a computer's settings to its corresponding template to see if any configuration settings have changed. Which tool would be the best choice?
What is the percentage change in the price of these bonds
: Both Bond Bill and Bond Ted have 5.8 percent coupons, make semiannual payments, and are priced at par value. Bond Bill has 5 years to maturity
|
What is the elasticity of tax liability
: What is the elasticity of tax liability with respect to income under this system for an increase in income from $15,000 to $25,000?
|
ISEM 502 User-Centered Design Assignment Problem
: ISEM 502 User-Centered Design assignment help and assessment help, Harrisburg University of Science and Technology - Design a questionnaire/survey for your.
|
Discuss each of the advantages in more detail
: Here are some of the advantages of Apache Pig: ease of programming, behind-the-scenes code optimization, and extensibility of capabilities.
|
Which tool would be the best choice
: You want to schedule a weekly analysis for the Windows servers in your data center. The command should run as a scheduled job and report any available patches.
|
How one can use hash values to log into a system
: Write a 2 -3 page paper on how one can use hash values to log into a system, crack a network, etc. Be sure to explain how hash values are used and misused.
|
Describe the difference between a fat ap and a thin ap
: In no less than 250 words, describe the difference between a fat AP and a thin AP. What is needed to deploy a thin AP? Are there any security considerations.
|
Discuss?the need for a request for proposal
: Discuss?the need for a Request for Proposal (RFP). When would you need to create a Request for Proposal? No Plagiarism Organization is UPMC.
|
What is the pv of the costs of operating a series
: The cost of capital is 8 percent. What is the PV of the costs of operating a series of such machines in perpetuity?
|