A. Large amount of ram to support antivirus
B. Strong passwords
C. Audit log periodically
D. Scan for unauthorized programs in system directories
Explanation: RAM has no effect on security of a system. System’s protection remains unchanged in increasing or decreasing amount of RAM.
A. A trusted antivirus
B. 24 hours scanning for virus
C. Firewall to separate trusted and untrusted network
D. Deny users access to websites which can potentially cause security leak
Explanation: Firewall create a protective barrier to secure internal network. An antivirus can only detect harmful viruses but cannot stop illegal access by remote attacker.
A. Create two domain trusted and untrusted domain
B. Create strong policy in firewall to support different types of users
C. Create a demilitarized zone
D. Create two dmz zones with one untrusted domain
Explanation: All live servers or workstations are kept in a separate zone than inside and outside to enhance protection.
A. Company computer to dmz
B. Internet to dmz
C. Internet to company computer
D. Company computer to internet
Explanation: Connection from internet is never allowed to directly access internal PCs but is routed through DMZ zone to prevent attacks.
A. It is a tool to monitor file systems
B. It is used to automatically take corrective action
C. It is used to secure unix system
D. None of the mentioned
A. They are encrypted
B. They act with special permissions
C. They modify themselves
D. None of the mentioned
A. Previously known patterns
B. It can detect unknown patterns
C. It can take high priority to increase scanning speed
D. None of the mentioned
A. It is a program which can be molded to do the desired task
B. It is a program that is controlled or emulated section of os
C. It is a special mode of antivirus
D. None of the mentioned
A. Not to open software from unknown vendors
B. Open and execute programs in admin level/root
C. Open and execute programs in presence of antivirus
D. None of the mentioned
Explanation: Disgruntled employees have in past infected the master copies of software programs to do economic harm to the company.