Thursday, November 21, 2019
CIS329 Week 123 Assignment Example | Topics and Well Written Essays - 250 words
CIS329 Week 123 - Assignment Example b) The type of hardware and site of installation should also be part of checklist. The hardware type can be used to solve compatibility issues with other hardware while installation site will ensure that adequate space is chosen for the occupancy of the hardware equipment (General 2011). a) In terms of user interface, win 7 supported touch screen although it was not perfect or ideal, that is, it did not have control features that are sufficiently good. Win 8 on the other hand has improved touch screen support. An example is that of desktop which is far better in such a way that the user can close window and be able to choose menu items without any problem. b) Windows8 also has improved performance in terms of short response time as compared to win7 since it has quicker ways of opening the target programs rather than just relying on menus given that the interface is built for touch. The additional advanced features of windows 8 also make it safer in terms of security features than win 7. a) It is necessary to bypass the use of digital signatures to validate or protect device drivers in situations where non-embedded intelligent Guards against Disasters (iGADs) does not have device driver. b) In the case where non embedded iGAD do not have, one or more disaster management applications is used to run on some platforms and thus digital signatures may not be necessary for protection (Liu et al., 2013). a) The key guideline that one should meet in order to justify an administratorââ¬â¢s decision to bypass the use of digital signatures when validating device drivers is the design guideline. This is because the design guideline has the basics of ensuring that many levels of security and dependability are open, modular and cost effective(Di Sarno, 2011). a) Both software restriction policy and AppLocker use group policy for domain management. Nevertheless, AppLocker takes precedence over software restriction policy on computer running windows
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.