Premium Essay


In: Computers and Technology

Submitted By pmjones39
Words 328
Pages 2
A comparison of existing security controls and settings with one or more baselines helps to validate the correctness of security controls. The process of comparing real computer configurations to known baselines, also called profiling, is important to ensure your configurations are correct and secure.

For each of the following scenarios, select the best tool to profile a Windows computer to determine if it satisfies your security requirements.

You must select from the following options: a. Security Configuration and Analysis (SCA) b. Microsoft Security Baseline Analyzer (MBSA)–Graphical User Interface (GUI) c. MBSA command line interface d. Shavlik NetChk Protect e. Secunia Security Analyzers

Suspected malware scenarios: | 1. You want to schedule a weekly analysis for the Windows servers in your data center. The command should run as a scheduled job and report any available patches for the Windows Server 2008 R2 operating system, Internet information services (IIS) Web server, or structured query language (SQL) server that have not been installed. Which tool would be the best choice? | | 2. | | 3. You like the way MBSA presents scan results but you need to scan for vulnerabilities in older Windows products, including Microsoft Office 2000. Which tool provides extended scanning and the ability to use MBSA to view scan reports? | | 4. | | 5. Your organization wants to encourage all of its employees and contractors to use vulnerability scanners at home as well as at work. You want to select a single vendor that can provide scanner software products for home and enterprise computers. A single vendor product line can streamline coordinating and analyzing scan results from many different computers. Which set of tools would be the best choice? | | 6. | | 7. You have developed several templates…...

Similar Documents

Free Essay

Network Design

...That is why it is crucial to physicaly secure the network componints. On the hold hand a wireless network can become supseptable to attacks from anyone in the range of the radio signal. A wireless network should have a very complicated password. When a device connects to mobile wireless signals, they open themselves to attack from other people on the same network. Useing hotspots should be limited to only trusted networks Conclusion In order for Kudler Fine Foods to expand their network, many improvements need to be implemented. Several pieces of equipment need to be upgraded and replaced. This type of redesign will allow for a quick switch over and a short downtime. The security conscerens will be address by creating restrictive network securiyt policies and procedures. The firewalls and anti virus software will also be overhalled. The dat arate requirments have been meet by changing the topology of the network to a star. Two switches allow for the network to have two zones that have components that don’t alway shave to communicate with the intire network. Our proposal will be a great undertaking. But with great planning and statagy, this change will be a smooth one. References Davidson, E. (2016). IT Security and the Importance of Policies and Procedures. Retrieved from How Firewalls Mitigate Attacks. (2015). Retrieved from......

Words: 1077 - Pages: 5

Smael (33) | Arly Jover | Fuck me and get your Christmas money my girl