COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

SECURITY MEASURES AND TECHNIQUES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Identify the method and example to overcome the following security risk.Elisa is a network engineer. He wants to control the incoming and outgoing network traffic of his organization.
A
Turn on firewall, Zone Alarm ProFirewall
B
Use data backup, Acronis Trueimage backup 2
C
Install antivirus, Invisible Secret4
D
Install antispyware, Securstore
Explanation: 

Detailed explanation-1: -The Trusted Zone is the “good.” It contains all the computers and networks you trust and want to share resources with-for example, the other machines on your local or home network. The Blocked Zone is the “bad.” It contains computers and networks you distrust.

Detailed explanation-2: -A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

Detailed explanation-3: -Click in the ANTIVIRUS & FIREWALL panel of the ZoneAlarm software client. Move the Application Control ON/OFF slider to ON or OFF position, as necessary.

Detailed explanation-4: -Open the ZoneAlarm Free Antivirus + Firewall security software client. Click anywhere in the FIREWALL panel to open the FIREWALL tab. Move the ON/OFF slider in the Basic Firewall section to either ON or OFF position.

There is 1 question to complete.