Workstation and Desktop devices are prone to viruses, malware, and malicious software, especially if the user surfs the Internet and World Wide Web. Given that users connect to the Internet and World Wide Web, what security countermeasures can organization implement to help mitigate the risk caused from viruses, malware, and malicious software?
Up to date anti-virus software and updated firewall.
Your employees e-mail file attachments to each other and externally through the organization’s firewall and Internet connection. What security countermeasures can you implement to help mitigate the risk of rogue e-mail attachments and URL web links? a.
Why is it recommended to do an anti-virus signature file update before performing an anti-virus scan on your computer?
So you have the most up to date anti-virus signature
Once a file is found malicious on your computer what are the default settings for USB/removable device scanning?What should organization do regarding use of USB hard drives and slots on existing computers and devices?
If you find a suspect executable and wish to perform “dynamic analysis” what does that mean?
What is a malware and malicious code sandbox? How you test the
What are typical indicators that your computer system is compromised?
Waiting for programs
Antivirus is disabled
Desktop icons have changed
What is a rootkit and what threat does it incur on systems?
Rootkit is association with malware. Once installed, it becomes possible to hide the intrusion as well as to maintain privileged access. The key is the root/Administrator access. Full control over a system means that existing software can be modified, including software that might otherwise be used to detect or circumvent it.
What security countermeasures are available to combat against root kits and malicious software? a.
Install a good antimalware solution on...
Please join StudyMode to read the full document