udv TEXTBOOK SOLUTIONS EXPERT Q&A; encryption and decryption? Wired Equivalent P
ID: 3902456 • Letter: U
Question
udv TEXTBOOK SOLUTIONS EXPERT Q&A; encryption and decryption? Wired Equivalent Privacy (WEP) Advanced Encryption Standard (AES) Pre-shared key (PSK) Wi-Fi Protected Access (WPA) 2. Which of the following is NOT a common anti-malware software component? Buffer overflow-a location to isolate unidentified malware for deletion Scanner-software that compares existing file contents with a signature database Shield-software that intercepts and scans all incoming (and optionally outgoing) information Vault-a secure location on the disk used to store identified malwareExplanation / Answer
Answer 2. Buffer over flow is not a common anti malware software. In this case the adjacent memory is written when the buffer boundary overflows.
Answer for( Assignment requirements)
1. Malware free means the computer or device should not contain any malicious software (in the form of virus, trojan horse, worm or spyware) which may lead to stealing, hijacking, amendment of data or spying without user's knowledge.
2.Easiest way to show that a device or computer is malwarefree is to download antivirus, malwarebyte and scan the device.If nothing is detected it means the device is malware free.There are some obvious signs when there are malwares in the devices whcih incudes slow performance of the device, unexpected pop ups,browser redirection/eratic behaviour,sudden advertisements ,device crashing,unnecesary apps, utility settings disabled ,antivirus disabled, difficulty in connecting to internet etc. If the device passes the scanning by good anti virus/anit malwares and does not have the typical signs for malware infection then the device should be malware free.
3.Steps to establish malware free device are as follows:
- install good antivirus and keep it upto date
- System clean up(including temporary files) using malwarebytes or PC cleanup
-login using safe mode to prevent malware from running
-Scan using malwarebytes or other malware scanners and remove any walware using anti malware softwares
4: Compliance of connected devices can be checked using the following steps:
-Scan the hardware and installed apps of the connected device(devices should be discoverable)
- Check the hardware details , OS, version, storage space, access, utility settings
- Check the details of all installed apps and settings to check if the assigned device compliance check list
- Verify if the device configuration is as per the policies
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.