Saturday, September 14, 2019
Computer
When your hard drive crashes from any of the correct selections in the question above, or from dropping It, it is known as head-to-disk interference, or HDL What tool s used to test serial and parallel ports? ESD would cause the most damage to which component? What voltage does a Pentium system use? How long Is an IPv6 address? What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet? Which protocol does DHCP use at the Transport layer?Where is a hub specified in the OSI model? What layer In the TCP/IP stack Is equivalent to the Transport layer of the OSI model? You want to Implement a mechanism that automates the IP configuration, Including IP address, subnet mask. default gateway, and DNS information. Which protocol will ou use to accomplish this? Which of the following is private IP address? Which layer 4 protocol is used for a Telnet connection? What protocol is used to find the hardware address of a local de vice? Which of the following protocols uses both TCP and UDP?A numeric error code check A 17xx Indicates a problem with: Which provides the fastest access to large video files? You were installing an application in Windows 95, and the computer crashes, what do you do? RS-232 is a standard that applies to:: You Just installed a new IDE hard drive, but your system BIOS will not recognize the new drive, what should you check first. During boot-up, the memory test: What is the first thing you could do to check for damage to a printer after receiving it? You have a system that periodically locks up.You have ruled out software, and now suspect that it is hardware. What should you do first that could help you narrow it down to the component at fault? What tool is used to test serial and parallel ports? You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server connected to the switch running 10Mbps half-duplex as well. How much bandwidth does each host have to the s erver? Which of the following is the valid host range for he subnet on which the IP Which protocol is used to send a destination network unknown message back to originating hosts? Computer Remote access domain can be assessed by requiring two credentials from the three something you are, something you have and something you know. This can impact the data stored on the network as well as the network itself. System and application domains can be assessed by removing unneeded software and patching regularly, this can impact issues with the software and unnecessary programs and usage. Executive management should review and consider the following issued within the domains. We can manage and mitigate these common risks with these practices.Failure to address these issues could result in data loss, outwork downtime and many more big issues. Our systems security should be a priority and these are the issues that need to be addressed. 1 . The aim of the risk assessment process is to remove a hazard or reduce the level Of its risk by adding precautions or control measures, as necessary. By doing so, you have created a safer and healthier workplace. 2. A qualitative assessment is based on opinion than actual fact, and IT risk assessments need to be based on a quantitative analysis. 3. The critical needs to be mitigated immediately. 4.By assessing how important the risk is to the infrastructure and how quickly the risk needs to be mitigated. The one's and two's need to be mitigated as soon as possible and the threes can be mitigated or left alone at management's decision. 5. -Restrict user access and set it up that a user has to get authorization for downloads. -Update software. -Increase WALL security using WPAD and AES encryption. -Strengthen firewall. -Strengthen firewall security; install PIPS and IDS systems to the infrastructure. -Make sure that the VPN is in place and secure. -Remove server, restore database from backup, and remove corruption from system. Computer Do you think this event was caused by an insider or outsider? Why do you t hint this? A An insider could have been included, tragically, but unintentionally, by joining g an individual USB streak removable commute to the workplace machine to the manager, w as contaminated somewhere else with an infection or worm.Be that as it may, all the more that n likely the guilty party was a pariah in light of the fact that it was expressed in account that the issues started when the clients clicked their email connections. Also most messages regularly origin neat from the outside. 2. Other than installing virus and worm control software, what can SSL do to p repaper for the next incident? A. They thought to introduce an understanding firewall into their framework KS. Really they should have had one effectively, overall this issue would not have happened.Be that as it may I guess they don ââ¬Ët have a strong security arrangement set up. Likewise, the way that they were putting in new infectio n programming lets me know that they either had a SSH baby one introduced before or that they never had one in any case. 3. Do you think this attack was the result of a virus or a worm? Why do you HTH ink this? A. Lat would need to be both. An infection can demolish your machine framework ark and a worm is used to spread it. Computer A hardware is something we can see and touch in a computer. What is a software? ââ¬â A software is something we can see but cannot touch, it is usually stored in a computer system. Some of the examples of hardware are: ââ¬â Mouse ââ¬â Keyboard ââ¬â Monitor ââ¬â CPU -Speaker ââ¬â Printer Scanner ââ¬â Trackball ââ¬â Joystick Some of the examples of software are: ââ¬â Microsoft Words ââ¬â Internet Explorer As of the moment, many trends come out in the business world to make human tasks more fast and easy. Information Technology plays a vital role in this part thus asking all necessary tasks more accurate and less time consuming.Nowadays, Information Technology holds a really Important role In our everyday life. Little things needed the work of IT to be completed. This chapter explains the wholeness of the project where in it explain the background of the company and the project. What is a hardware? ââ¬â A hardware is something we can see and t ouch in a computer. What Is a software? ââ¬â A software Is something we can see but cannot touch, It Is usually stored in a ââ¬â Scanner Nowadays, Information Technology holds a really important role in our everyday life.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.