Explain three (3) approaches to protecting an enterprise network against malware or viruses.
When assessing malware risks, midsize businesses need to be mindful of the attack vectors that are most vulnerable to threats. How are they protected and to what extent? The following questions should be considered:
Does the company have a firewall installed?
Firewalls are an important part of perimeter defense. A network firewall commonly serves as a primary line of defense against external threats to an organization's computer systems, networks, and critical information.
Does the company have internal or external vulnerability scan analysis capability? How is the scanned information analyzed?
A tool such as the Microsoft Baseline Security Analyzer (MBSA) is recommended for scanning for misconfigurations or vulnerabilities.
Is there a backup and recovery assessment plan in place?
Ensure that there are backup plans and that the backup server is working effectively.
Suggest two (2) security products that one may use in conjunction with one another to help protect network resources.
ENDPOINT PROTECTION SOFTWARE:-
The best endpoint protection providers offer an efficient management console that can control all endpoints, software deployment and policy enforcement backed by a consistent, proven ability to protect your network from malware.
Administrators protect networks:-
The most adept also provide technologies for managing employee-owned devices that often have access to corporate resources to further help administrators protect networks.
Content will be erased after question is completed.