Question: (A )Description: IT Professionals rely on knowing the latest security threats and the best security strategies to keep networks, computers, and equipment safe. Follow the

(A )Description:

IT Professionals rely on knowing the latest security threats and the best security strategies to keep networks, computers, and equipment safe. Follow the instructions below to complete Project 6:

Using the Web to Learn About Malware Est. Time: 15 minutes Core 2 Objective: 2.3 One source of information about malware on the web is F-Secure Corporation. Go to the website f-secure.com or another anti-malware site, and find information about the latest malware threats. Answer the following questions: 1. Which site did you use to research the latest malware? 2. Name and describe a recent Trojan downloader. How does the Trojan install, and what is its payload (the harm it does)?

3. Name and describe a recent rootkit. How does the rootkit install, and what is its payload? 4. Name a recent worm. How does it get into the network, and what is its payload?

(B)Hands-On Project 16-2 Researching CoC and Incidence Response Documents:

Researching CoC and Incidence Response Documents Est. Time: 15 minutes Core 2 Objective: 4.6

Your manager has been asked to create the documentation necessary for your new data-destruction company to be compliant when handling regulated data. They have asked you to recommend some sample documentation for chain-of-custody (CoC) and incident-response documents. Find three examples of each document. For the CoC documents, which components do each sample have in common? For the incident-response documents, which com-ponents do each sample have in common? Which CoC document would you recommend? Which incident-response document would you recommend?

1(B) Description:

You are an IT Professional hired by ABCXYZ Company. The company requires computer equipment for their employees. There are 30 employees: 1-President, 1-Vice-President, 5-Salespersons, 1-Marketing Manager, 3-Secretaries, 10-Customer Service staff, 2-Accountants, 1-Financial Manager, 3-Designers, 1-IT Staff, 1-Shipping staff, and 1-Customer Service Supervisor. You will be recommending the new computers, laptops, operating systems (OS), and security software needed. Follow the directions below to complete Project 8.

Make recommendations to your company for the following for each of the 12 positions listed above:

Type or types of computers each department should have, laptops and mobile device

Include the RAM, screen size, manufacture, processor type and speed, storage

Include graphic photo of the computers, laptops, and/or mobile devices you chose

Include recommended security software to protect each device

Include the operating system of each recommended laptop and mobile device

For ease of understanding your information, you should set up your recommendations in tables, either on an Excel spreadsheet or Word doc.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!