Preview

M6 Assignment

Satisfactory Essays
Open Document
Open Document
387 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
M6 Assignment
L7 Review Questions
1. Collect – send data collection packets out to collect information about applications that are running, Analyze – organizing all the data collected and add compatibility issues, Test and Mitigate – make the determination whether the compatibility issues are real problems on the network
2. Move the site to the Trusted Sites zone, disable protected mode on IE, and modify the application.
L7 Scenarios
7-1: The method I would use would be the SmartScreen filter. With IE 8 and SmartScreen filtering it uses the following to prevent phishing:
Online look up of phishing sites – which is a maintained list of phishing sites updated several times an hour.
Online look up of download sites – when a download is started IE checks the source.
Onsite analysis – IE examines the download as it’s being processed onto your computer.
7-2: She will have to create two rules, an allow rule which will grant the ResDev group access, and a deny rule that will only apply to the RDint group. L8 Review questions
1. Instances make it easier to monitor more than one of the same component.
2. Because the updates will be downloading and there is no requirement for the employees to not be on the workstations but there will be times when the updates install the employee might need to restart the workstation to implement the update that installed.
L8 Scenario

8-1: I have to first go into Group Policy > Specify intranet Microsoft update service location, which is where I will specify the name of the WSUS server that I want my clients to access. After that you will be able to set up the Configure Automatic Updates and other settings to configure the behavior of the Windows Update clients.

L9 Review Questions
1. Because it displays all elevation prompts on the secure desktop, which can receive messages only from Windows processes which prevent any active Malware to continue into the secure desktop.
2. A group is an identifying token that Windows uses to

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Assignment 6

    • 479 Words
    • 2 Pages

    Course criteria covered: Unit 2 1.1 Explain the historical development of the person-centred approach to counselling, including the people influential in its development. 1.2 Explain the philosophical basis of the person-centred approach. 1.3 Explain the key concepts and principles of the person-centred approach. 1.4 Explain how the person-centred approach informs the practice of a qualified trained counsellor. 1.5 Explain how the person-centred approach influences the understanding of the development of the concept of self. 1.6 Explain why it is important to have an understanding of a therapy model before using its methods and techniques. Unit 2 2.1 Explain the key features of the psychodynamic and cognitive–behavioural models of counselling. 2.2 Compare and contrast these models with the main model chosen…

    • 479 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    • Software updates will be ongoing during the project, so the installation of software on the destination servers will be done once that version of the…

    • 1244 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    e) Bypass Begin Your Download form, on the bottom of the page, choose No thank you, just take me to the downloads,…

    • 933 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IS305

    • 300 Words
    • 2 Pages

    9. They can set up a WSUS server that runs at certain times and holds the updates that can bring down the computer because the update hasn’t been tested yet.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The threat I researched in week 7 was a Trojan horse. It is not a self-replicating threat, but it attaches itself to the cookies and temporary internet file folders of a users’ browser history. It re-routes a user’s log in to a malicious web address. By doing this, it causes users to click on other links that further spreads harmful malware, adware, and spyware to their systems, without them even knowing it. The only way to prevent this is to completely clear your cache, cookies, and temporary internet files folders every time you end an Internet browsing session. Running checks through an anti-virus program can also clean these…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS4560

    • 486 Words
    • 2 Pages

    To make sure no one can penetrate your web application before you put it in a live situation.…

    • 486 Words
    • 2 Pages
    Good Essays
  • Best Essays

    It checks for connection speed and static on the line to ascertain the best route for the packet to take to reach its destination. Acting as a gateway between networks, routers make sure that data is delivered to its proper destination. The second purpose of a router is to ensure that data does not go where it is not permitted. By acting as a virtual network traffic cop, routers keep data and specifically large files from being distributed to all machines on a network, which could potentially cripple the network (Hill,…

    • 4393 Words
    • 18 Pages
    Best Essays
  • Powerful Essays

    Ets Proficiency

    • 796 Words
    • 4 Pages

    Step 2: Close all open applications except Internet Explorer or Safari (if using a MAC) before accessing the site.…

    • 796 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    knowledge not to click on unusual links you get in spam emails, or entering your personal…

    • 405 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nfs14 X86 Analysis

    • 840 Words
    • 4 Pages

    This is one of the most commonly faced problems, that intimidates people, particularly after they have migrated from a lower level windows to an upper level one, wherein they cannot run the windows updates. As soon as they try to do so,…

    • 840 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Gprs

    • 10748 Words
    • 43 Pages

    GPRS (general packet radio service) is a new nonvoice service that is being added to existing IS-136 TDMA (time division multiple access) networks.…

    • 10748 Words
    • 43 Pages
    Powerful Essays
  • Powerful Essays

    Internet Vocabulary

    • 1414 Words
    • 6 Pages

    Phishing: is the act of attempting to acquire information, such as username and password by masquerading as a trustworthy entity in as electronic communication…

    • 1414 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    “This is a case study in search for a solution dealing with cybercrime populating the web. Cybersex, hacking, scamming, identity theft, violation of human privacy, fraud, breaking national security, spamming, viruses, malware, adware, spyware and many others, all these happening 24/7 on the web, while at the office, at work, at the school, at the internet cafe or even at home. They are terrifying consumers and on other side being exploited by companies or individuals craving for easy money taking advantage of fast internet browsing.…

    • 7416 Words
    • 30 Pages
    Good Essays
  • Powerful Essays

    Srs Templet

    • 831 Words
    • 4 Pages

    [Place your revision history in here. Your instructor wants to see how you have been working on this document during this term, and who’s done what and when.]…

    • 831 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    I Want to Study

    • 305 Words
    • 2 Pages

    Manage and protect the system, data, and information while working on the Internet including scanning all incoming emails, email attachments, and files downloaded from Web-based sources; firewall,…

    • 305 Words
    • 2 Pages
    Satisfactory Essays