You must first determine a baseline for application security before you can begin the process of hardening the technology. In this video, you’ll learn some best practices for security baselining and some techniques for hardening the operating system and application environment.
The network adapter configuration is the first step when connecting to the network. In this video, you’ll learn how to set adapter configuration settings and configure quality of service (QoS) options.
Which of these utilities allows you to “back in time” to automatically revert your computer to a previous configuration without changing any of your documents and personal files?
Your computer’s BIOS contains many different configuration options. In this video, you’ll learn how to make configuration changes to your BIOS without risking the operation of your computer.
The BIOS is an important part of your computer’s configuration. In this video, you’ll learn about the PC BIOS and it’s importance to the startup process of your computer.
Each network port of a switch can be configured in many different ways. In this video, you’ll learn about the symptoms that occur when a switch port is not configured properly and some of the ways to troubleshoot and resolve these port configuration issues.
A wireless network requires the configuration of many different settings. In this video, you’ll learn about common wireless configurations and how to avoid problems with your wireless installations.
If you’re installing a new wireless access point or a router, you’ll have many options for configuring the interfaces. In this video, you’ll learn about the options for Ethernet ports and other configuration choices.
If you’re going to constantly check on the security of your application, you’ll need a baseline to which everything should refer. In this video, you’ll learn the basics of application configuration baselining and some techniques you can use to harden your applications against attack.
At what point is the “Last Known Good Configuration” updated to the current configuration? A) Five minutes after boot B) During the next login C) During the next System Restore checkpoint D) During the next logoff E) What’s really “good?” What if the configuration is only “somewhat reasonable?”