1. ListfivetypesofsysteminformationthatcanbeobtainedfromtheWindows Task Manager. How can you use this information to confirm the presence of malware on a system? ( ) 2. WindowsTaskManagerandWindowsComputerManagerbothprovide information about system services. Compare and contrast

1. ListfivetypesofsysteminformationthatcanbeobtainedfromtheWindows Task Manager. How can you use this information to confirm the presence of malware on a system? ( ) 2. WindowsTaskManagerandWindowsComputerManagerbothprovide information about system services. Compare and contrast the types of information (about system services) that can be obtained from these tools. 3. ExplainhowyoucoulduseoneormoreoftheWindowslog(Application, Security, Setup, System, and Forwarded Events logs) files to investigate a potential malware infection on a system. types of information are available to you in your chosen log file? 4. Shouldyoufilterlogfilesduringaninvestigationintoasecurityincident?Why or why not? 5. Shouldremotedesktopservicesbeenabledonemployeeworkstationsforuse by IT Desk personnel? Why or why not? 6. HowdoesMicrosoftBaselineSecurityAnalyzer(MBSA)differfromWindows Update? Why are Shares a source of system vulnerabilities?

Do you need us to help you on this or any other assignment?


Make an Order Now