Answer Posted / nimesh maru
Hardend the system ( does not matter which OS ) Run the
vulnerability test if possible, Install the necessary Patch
. Make sure you download the patch from the vendor site or
Trusted Location. Disable all unwanted services. Remove all
the unwanted users from the systems Profile. Have good Anti
virus software installed and make sure it is updated
regularly. Install a good Firewall software and even that
should be updated regularly. Install a good Malware,
spyware, adwareremover. Make sure u run the disk encryption
on the system. Disable access to cd rom/ dvd rom drives and
usb port. There are many more things to do but few have been
listed here.
| Is This Answer Correct ? | 12 Yes | 1 No |
Post New Answer View All Answers
What are the benefits of the firewall?
Explain what is the role of single sign on in authentication technologies?
Explain for a small lan which class of addressing is used?
What is information security?
What is adware?
What is network access control?
What is secure remote access?
Why do we use virtual private network?
What do you do when you get blue screen in a computer? How do you troubleshoot it?
Why is it important to have a nac solution?
What is kerberos protocol?
What is difference between arp & rarp? How both of these protocols will work, and where it will use?
What are the types fo ddos attacks?
What is the difference between a virus and malware?
What is trojan virus?