List and describe the four different locations in which anti-malware can be installed.

What will be an ideal response?


ANSWER: When implementing anti-malware software on a network, one of your most important decisions is where to install the software. Some scenarios include:
* host-based-If you install anti-malware software on every desktop, you have addressed the most likely point of entry, but ignored the most important files that might be infected-those on the server.
* server-based-If the anti-malware software resides on the server and checks every file and transaction, you will protect important files, but slow your network performance considerably.
* network-based-Securing the network's gateways, where the Internet connects with the interior network, can provide a formidable layer of defense against the primary source of intrusion-the Internet. However, this does nothing to prevent users from putting the network at risk with infected files on flash drives, laptops, or smartphones.
* cloud-based-Many anti-malware solutions already employ cloud-based resources within their programming. And cloud-based anti-malware provides the same kinds of benefits as other cloud-based solutions, such as scalability, cost efficiency, and shred resources. These cloud vendors are still working out bugs, and it can be a challenge to ensure that coverage soaks the entire network with no blind spots. Cloud solutions also increase the amount of Internet traffic in order to perform their duties.

Computer Science & Information Technology

You might also like to view...

Which of the following is not a data type used to represent a floating point value

A. float B. double C. long double D. short

Computer Science & Information Technology

How did the Wi-Fi Alliance resolve the issues with WEP?

What will be an ideal response?

Computer Science & Information Technology

Which of the following is not a good reason for using a form for data entry?

A) You can show data from more than one table at a time. B) Data you enter in a form must then be transferred to the table. C) Your form can resemble paper forms. D) You probably will not edit the wrong record.

Computer Science & Information Technology

eSATA ports provide high-speed connections for external hard-disk drives, optical discs, and other large secondary storage devices.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology