I. Downloadable programs
II. Cracked software
III. Email attachments
IV. Internet
V. Booting from CD
Answer 1(b). The questions are like that which anti-virus is used by ISP to protect our organization data, they use single antivirus or number of antivirus to give defense-in-depth security, they need to read our TCP traffic so that they allow only those packets which are useful in organization and deny the other packets or other questions related to bandwidth, type of modem and speed.
Answer 1(c). Anti-malware program helps in finding malware, infected file or files which have hidden viruses and which are not detected by the anti-virus program. Anti-virus program helps in preventing the viruses, but some files which have hidden malware codes which are not detected by the anti-virus programs, but the files are store on some space in the memory. These malware codes are hide itself in any file, re-merge, re-propagate and re-infect, in that time anti-malware program find the infected file which have hidden malware and delete that files from PC.
Answer 1(d). I want to limit ActiveX controls to only trusted sites because this program is very insecure, it is not restricted from doing bad things with user computer, it monitor user personal browsing habits, install …show more content…
For securing the servers physically we need to lock the server room and use advance authentication system on the door of server room so that only authorized user can enter into the server room like we need to use smart card, token and biometric scanner etc on the door of server room. Use a video camera to watch who is enter into the server room and who access the resources in the server room and we also use sensors in server room to detect the unwanted movements in server room, so that in absence of staff if anybody access to the server that sensor detect that person and provide notification report to administrator through voice or