Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

please answer carefully. An IT administrator requires full administrator privile

ID: 3905608 • Letter: P

Question

please answer carefully.

An IT administrator requires full administrator privileges on several devices across the enterprise network The administrator remotely manages multiple systems on the network and will occasionally make changes to ensure proper maintenance of these systems, The administrator's secondary duties include email correspondence web searches. file transfers. and web based meetings Which of the following practices would BEST prevent the escalation of a malware breach while the administrator is performing secondary duties? (Select TWO), A) Ensure the administrator's password has a high character length and complexity, B) Create a second user account for all Internet-facing activities and limit its privileges C) Perform remote management duties on a separate workstation, D) Perform tasks on a physical machine with signature-based antivirus, E) Use group policy to prevent remote logins on the administrator's workstation, F) Perform tasks inside a VM with automatic disk snapshots every eight hours

Explanation / Answer

Answer: Since, the administrator’s secondary focus is on the below listed parameters such as:

the following two statements are suitable as far as privacy and security of a company is concerned.

B) Create a second user account for all Internet-facing activities and limit its privileges

A second user account must be created for all staff with regards to the internet interaction activities and limit their privileges.

The limiting privileges is a major factor Since most of the employees knowingly or unknowingly are trapped by the third party attackers.

Some areas where putting a barrier/boundary will aid the company are:

D) Perform tasks on a physical machine with signature-based antivirus,

The next important practice for an IT admin is to make the employees to accomplish tasks on a physical machine. The computation done on a physical machine is safe since the data is local to the system itself. Hence the leakage of confidential data/information can be averted.

Signature based antivirus:

The working of signature based antivirus is explained below: