What security actions are considered to be the best defense against a virus like the Slammer Worm?
Answer)
The Slammer worm is the one, which performs denial of service on Internet hosts and slows down the traffic. The worm spreads rapidly and this is the result of a buffer overflow bug in the MS SQL Server and the desktop engine. The security actions, which can be taken to defend against it, are:
Administrators should block the UDP port 1434 as the Slammer work uses thus port. They should download and apply the SP3 from Microsoft for this.
Installed anti-virus and anti-malware on the system, and perform system scanning time to time.
Do not download unknown files, visit unknown links.
Use a personal firewall always to block suspicious traffic.
Perform secure browsing using https.
What security actions are considered to be the best defense against a virus like the Slammer Worm?
Choose the best answer for the following questions. 11. Which of the following would be considered the body's first line of defense against antigens? a. gastric HClean
Note: Questions can have multiple valid answers, hence select all choices that apply. 1. What security feature ensures that only trusted and approved parties can view a file? a) Availability b) Integrity e) Confidentiality d) Authorization e) None of the above 2. An organization wanting to achieve improved security via diversity should: a) Limit access to information to certain individuals and systems b) Perform extensive types of penetration testing of its networks and systems c) Purchase products from multiple different...
What virus causes the flu? Why doesn't the body produce permanent immunity against that virus? How does the vaccine against the flu work?
What are the roles of TNF in the body defense against infection. Please include reference.
How does a person build a line of defense against a pathogen? What is the difference in antigenic drift and antigenic shift?
The main human defense against fungal infections is a very strong immune reaction against fungi. What is the powdery dust produced when the boys kicked the giant puffball? Why would the powdery children who were immune compromised? Be sure you understand the difference between alergy and and immune failure.
Management would like you to report on the Storm worm. Describe where it came from, what it does, and how it can be stopped. How does this malware use virtualization?
What is the best reason why attributes, like customer loyalty or a talented workforce, aren't considered to be intangible assets? Because amortization is not possible. Because they are actually wasting assets. Because verification is too complex. Because they can disappear over a short period of time due to poor management or environmental effects.
in terms of innate immunity what is the body's second line of defense against microbial infection/disease? explain the roles of the formed elements in the blood, lymphatic system, and phagocytes.
What are two (2) mechanisms of defense that bacteria have against viruses? Describe how each of these works TT T Ariel 3 (12pt) T MIT