Antimalware Programs (39.5.7) Malware includes viruses, worms, Trojan horses, keyloggers, spyware, and adware. These are designed to invade privacy, steal information, damage the computer, or corrupt data. It is important that you protect computers and mobile devices using reputable antimalware software. Table 39-6 summarizes the types of antimalware programs that are available. Table 39-6 Types…
Author: examcert
Packet Filtering Firewall Benefits and Limitations
Packet Filtering Firewall Benefits and Limitations (39.5.4) Packet filtering firewalls are usually part of a router firewall, which permits or denies traffic based on Layer 3 and Layer 4 information, as shown in Figure 39-16. They are stateless firewalls that use a simple policy table lookup that filters traffic based on specific criteria, as shown…
Types of Firewalls – 100-150 Exam Study Guide
Types of Firewalls (39.5.2)It is important to understand the different types of firewalls and their specific capabilities so that the right firewall is used for each situation. Packet Filtering (Stateless) FirewallPacket filtering firewalls are usually part of a router firewall, which permits or denies traffic based on Layer 3 and Layer 4 information, as shown…
Network-Based Malware Protection
Network-Based Malware Protection (39.4.4) New security architectures for the borderless network address security challenges by having endpoints use network scanning elements. These devices provide many more layers of scanning than a single endpoint possibly could, as shown in Figure 39-10. Network-based malware prevention devices are also capable of sharing information among themselves to make better-informed…
Host-Based Malware Protection
Host-Based Malware Protection (39.4.3)The network perimeter is always expanding. People access corporate network resources with mobile devices that use remote-access technologies such as VPN. These same devices are also used on unsecured, or minimally secured, public and home networks. Host-based antimalware/antivirus software and host-based firewalls are used to protect these devices. Antivirus/Antimalware SoftwareThis is software…
Antimalware Protection – 100-150 Exam Study Guide
Antimalware Protection (39.4) Malware, is short for “malicious software.” Malware is any type of software that is specifically designed to damage, disrupt, or gain unauthorized access to end devices or networks. The intent of malware is to steal sensitive information, compromise system functionality, or perform other harmful actions Endpoint Threats (39.4.1) The term “endpoint” is…
What Is Boot Integrity? – 100-150 Exam Study Guide
What Is Boot Integrity? Boot integrity ensures that the system can be trusted and has not been altered while the operating system loads. Firmware—software instructions about basic computer functions—is stored on a small memory chip on the motherboard. The basic input/output system (BIOS) is the first program that runs when you turn on the computer….
Host Intrusion Detection Systems (HIDSs)
Host Intrusion Detection Systems (HIDSs) HIDS software is installed on a device or server to monitor suspicious activity. It monitors system calls and file system access to detect malicious requests. It can also monitor configuration information about the device that is held in the system registry. A HIDS stores all log data locally. It is…
Patch Management – 100-150 Exam Study Guide
Patch Management (39.3.4)Cybercriminals work relentlessly to exploit weakness in computer systems. To stay one step ahead, keep systems secure and up to date by regularly installing patches. What Are Patches?Patches are code updates that prevent a new virus, worm, or other malware from making a successful attack. Patches and upgrades are often combined into a…
Check Your Understanding—Access Control
Check Your Understanding—Access Control (39.2.12)Refer to the online course to complete this activity. Video—Configure Access Control (39.2.13)Refer to the online course to view this video. Packet Tracer—Configure Access Control (39.2.14)In the following Packet Tracer activity, you will complete the following objectives: Refer to the online course to complete this Packet Tracer. Defending Systems and Devices…