Implementing Desktop Security: Best Practices

Ensure Maximum Desktop Security

Prev Question Next Question


Which three actions are advisable when implementing desktop security? (Choose three.)



Click on the arrows to vote for the correct answer

A. B. C. D. E. F.


When implementing desktop security, it is important to take several actions to protect the users and their machines. Here are explanations of the three advisable actions:

A. Installing and maintaining anti-virus/anti-malware software: One of the most important actions to take when implementing desktop security is installing and maintaining anti-virus/anti-malware software. This software is designed to detect and prevent malicious software from being installed on a user's computer. It can detect viruses, spyware, adware, and other types of malware. Regularly updating the anti-virus/anti-malware software ensures that the latest threats are being detected and prevented.

B. Educating users on the danger of opening files and attachments from un-trusted sources: Another important action is educating users on the danger of opening files and attachments from un-trusted sources. Many security breaches occur because users unwittingly open attachments or click on links in emails that contain malware. Educating users about these risks and how to avoid them can help prevent these types of attacks.

E. Staying up to date with operating system patches and updates: Staying up to date with operating system patches and updates is also crucial. These patches and updates often include security fixes that address vulnerabilities that have been discovered. Installing these updates as soon as they become available helps to ensure that the user's computer is protected from known vulnerabilities.

It is important to note that the other options, such as statically defining user password based on information like employee ID number and configuring multiple local network DHCP servers, are not advisable actions for implementing desktop security. Statically defining user passwords based on easily obtainable information, such as an employee ID number, is a security risk, as it makes it easier for attackers to guess or crack passwords. Configuring multiple local network DHCP servers is also not a security measure and may actually introduce security risks if not configured correctly. Finally, configuring client firewalls to automatically disable during business hours as not to impact production traffic and applications is not advisable as it leaves the network unprotected during those hours.