List and briefly describe the three critical Windows settings that keep the system protected from malware and hackers.

What will be an ideal response?


1. Windows Updates. Install any important Windows updates or Windows 7 service packs that are waiting to be installed and verify that Windows Update is configured to automatically allow updating. 2. Antivirus software. To protect a system against malicious attack, you also need to verify that anti-malware software is configured to scan the system regularly and that it is up to date. 3. Network security setting. To secure the computer against attack from the network, check that the network security type (public or private/guest in Windows 8; public, work, or home in Windows 7) is set correctly for the optimum firewall settings.

Computer Science & Information Technology

You might also like to view...

It is a common practice to begin a procedure name with a verb and to enter the name using ____ case.

A. Camel B. Hungarian C. Pascal D. Capitalized

Computer Science & Information Technology

When a program is executing, and it reaches a declaration of an object variable, where does the program execution automatically go to next?

A. The class destructor. B. The class constructor. C. The class instructor. D. The class scope operator.

Computer Science & Information Technology

In the Phase-Shift-Keying modulation technique one signal is the ____________________ of the other signal.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Using the System Reset tool a Restore Point may be chosen and the system returned back to that point in time.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology