IDENTIFYING AND RESPONDING TO SECURITY EVENTS

     
  1. A worm is a form of malicious software that makes copies of itself.

  2. A virus is a program or malicious code that secretly replicates itself by attaching to a medium such as another program, the boot sector, a partition sector, or a document.

  3. Unlike a virus or worm, a Trojan horse does not replicate nor make copies of itself. The main purpose of a Trojan horse is to compromise security such as stealing passwords.

  4. Antivirus software should be installed on all computers. Keeping the signature files up to date is also important.

  5. One of the most common ways that viruses are spread is through email attachments.

  6. Critical updates are those updates that are deemed important to the normal functioning of a computer.

  7. Windows XP supports Automatic Updates. This feature can keep a computer up to date with the latest critical updates with little user intervention.

  8. Microsoft Security Baseline Analyzer (MSBA) is available from the Microsoft Web site. It can tell you which updates are missing as well as any configuration changes that you should make to increase security.



MCDST 70-272 Exam Cram 2. Supporting Users & Troubleshooting Desktop Applications on a Windows XP Operating System (Exam Cram 2)
MCSA/MCSE 70-291 Exam Cram: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (2nd Edition)
ISBN: 0789736187
EAN: 2147483647
Year: 2003
Pages: 119
Authors: Diana Huggins

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net