Premium Essay

Securiyt

In: Computers and Technology

Submitted By pmjones39
Words 328
Pages 2
A comparison of existing security controls and settings with one or more baselines helps to validate the correctness of security controls. The process of comparing real computer configurations to known baselines, also called profiling, is important to ensure your configurations are correct and secure.

For each of the following scenarios, select the best tool to profile a Windows computer to determine if it satisfies your security requirements.

You must select from the following options: a. Security Configuration and Analysis (SCA) b. Microsoft Security Baseline Analyzer (MBSA)–Graphical User Interface (GUI) c. MBSA command line interface d. Shavlik NetChk Protect e. Secunia Security Analyzers

Suspected malware scenarios: | 1. You want to schedule a weekly analysis for the Windows servers in your data center. The command should run as a scheduled job and report any available patches for the Windows Server 2008 R2 operating system, Internet information services (IIS) Web server, or structured query language (SQL) server that have not been installed. Which tool would be the best choice? | | 2. | | 3. You like the way MBSA presents scan results but you need to scan for vulnerabilities in older Windows products, including Microsoft Office 2000. Which tool provides extended scanning and the ability to use MBSA to view scan reports? | | 4. | | 5. Your organization wants to encourage all of its employees and contractors to use vulnerability scanners at home as well as at work. You want to select a single vendor that can provide scanner software products for home and enterprise computers. A single vendor product line can streamline coordinating and analyzing scan results from many different computers. Which set of tools would be the best choice? | | 6. | | 7. You have developed several templates

Similar Documents

Free Essay

Network Design

...Network Design Project Intruction Kudler Fine Foods is making steps to inhanse the existing network, including wireless technology. These changes are being provided to improve the comuunication links between the stores and all employees. We will be implementing new technologies to automate inventory managment by creating orders of products from the transactions at the POS. The VOIP phones will be repalced with wireless VOIP phones and will allow for the employees to take calls as they provide servieces for their costumers. The improvements in network security will provide real time monitoring. Timeline The redesign of the Kudler Fine Foods will be an extreme undertaking. We will need three months to fully reconfigure the network. Since each store will have to have new cable and equipment run throughout, the downtime for each location will be minimul. In the network closet the new router will be installed, along with the two new switches. The Cat 6 Ethernet has to be run from this closet to each access point. The two servers will need to be backed up and the data will be uploaded to the new servers. A wireless access point will be added to the network and the printers and VOIP phones will be configured. While the store is closed, all the user devices will be connected to the new ports and the network will be connected to the inetnet. Design Approach and Rationale My approach to the design of this network starts with security and usablilty. The network most be fast, reliable...

Words: 1077 - Pages: 5