What is the policy in Group Policy that can be set to audit
Solution
ANSWER:
5) Audit logon policy
6)
7)
8) RFID Badge.
9)
10)
11) ATA Secure Erase, you can download a Secure Erase utility from the manufacturer of the device and run it to securely erase all data on the device.
12) A privacy filter installed in a laptop to prevent shoulder surfing.
13) virus:
A virus is a program that replicates by attaching itself to other programs. The infected program must be executed for a virus to run.
worm: A worm is a program that copies itself throughout a network or the Internet without a host program.
Trojan: A Trojan does not need a host program to work; rather, it substitutes itself for a legitimate program.
14) If you recieve an email stating your computer has a virus. It IS a hoax.
15) Quarantine the computer.
16) Run a virus scan an uninstall it or use a restore point
17 )Windows Defender (Microsoft repurposed the name for the anti-malware product) is enabled by default.
18) HKLM\\System\\CurrentControlSet\\Control\\Safeboot is the registry key that keeps this information. The subkeys under this are Minimal (safemode without networking) and Network (safe mode with networking).
19) The folder \"System Volume Information\" is a hidden system folder located in the root of the drive and is used by windows to hold system restore points. C:\\System Volume Information\\_ Restore folder.
20) Removing malware from System Restore points To remove malware you must first disable System Restore, then scan the system with up-to-date antivirus software allowing it to clean, delete.
