Which of the following actions can he take to protect his computer from unauthorized access, adware, and malware?

Mark purchases a new computer and installs the Windows 2000 Professional operating system on it.
He wants to connect the computer to the Internet. Which of the following actions can he take to
protect his computer from unauthorized access, adware, and malware?
Each correct answer represents a complete solution. Choose two.

Mark purchases a new computer and installs the Windows 2000 Professional operating system on it.
He wants to connect the computer to the Internet. Which of the following actions can he take to
protect his computer from unauthorized access, adware, and malware?
Each correct answer represents a complete solution. Choose two.

A.
Configure a firewall on the computer.

B.
Configure auditing on the computer.

C.
Set hidden attributes on his important files.

D.
Install all the service packs available for the operating system.

Explanation:
In order to protect his computer from unauthorized access, adware, and malware, Mark can take the
following actions:
Install all the service packs available for the operating system.
Configure a firewall on the computer.
What is Service Pack?
A service pack is a collection of Fixes and Patches in a single product. A service pack can be used to
handle a large number of viruses and bugs or to update an operating system with advanced and
better capabilities. A service pack usually contains a number of file replacements.
What is a firewall?
A firewall is a tool to provide security to a network. It is used to protect an internal network or
intranet against unauthorized access from the Internet or other outside networks. It restricts
inbound and outbound access and can analyze all traffic between an internal network and the
Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports.
Answer option C is incorrect. Setting hidden attributes on files cannot protect computers from
unauthorized access, adware, and malware.
Answer option B is incorrect. Configuring auditing will not protect computers from unauthorized
access, adware, and malware. Auditing is used to track user accounts for file and object access, logon
attempts, system shutdown, etc. This enhances the security of the network.
Reference:
TechNet, Contents: ” Chapter 2 – Malware Threats”



Leave a Reply 0

Your email address will not be published. Required fields are marked *