Why the given settings create a secure operating system

Assignment Help Operating System
Reference no: EM132128734

Question: You are a security administrator responsible for providing secure configuration requirements for new laptop deployments. After reading Module 2 of Certified Secure Computer User v2exercises, apply the configuration settings below on your Windows® or Mac® computer and take screenshots of each step:

Windows:

1. Lock system when not in use

2. Create and change user account password

3. Disable Guest Account

4. Enable Automatic Software Updates

5. Enable Firewall

6. Create a New Firewall Rule

7. Turn on Windows Defender

8. Enable bitlocker

9. Decrypt file using EFS

10. Disable Unnecessary Services

Paste screenshots into a Microsoft® Word document to demonstrate you applied the configurations.

Write a 1-page explanation on how and why these settings create a secure operating system.

Reference no: EM132128734

Questions Cloud

What are steve demands for contract : What are Steve's demands for a contract? Is Steve the offeror? or the Offeree?
Team building is group process intervention : Team building is a group process intervention that “refers to a broad range of planned activities that help groups improve the way they accomplish tasks”
How would you decide what information to collect : List any potential ethical issues in the conduct and execution of your research and propose how to address them.
Loan-investment alternatives to maximize total annual return : How should the $2.3 million be allocated to each of the loan/investment alternatives to maximize total annual return?
Why the given settings create a secure operating system : You are a security administrator responsible for providing secure configuration requirements for new laptop deployments. After reading Module 2 of Certified.
Identify academic research that supports goal setting theory : MBA505 Business Psychology, Coaching and Mentoring Assessment - Poster Presentation. Identify the academic research that supports goal setting theory
Evaluating your business : Evaluating Your Business? What are the criteria for a successful online store?
Create and implement solid strategy : How do key elements including vision and mission statements, strengths, balanced score cards flow together to create and implement a solid strategy?
Create the first section of your playbook : Create the first section of your Playbook/Runbook. This week you researched malware, attack vectors, and how they are related to cybersecurity.

Reviews

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd