Threats, Vulnerabilities, and Maintenance

Each topic can be 1-2 paragraphs which will sum up to 2 pages. I’ve attached the template needed for the assignment along with the grading rubric

Complete the following in a Word document titled “Assessment 4”:

Don't use plagiarized sources. Get Your Custom Essay on
Threats, Vulnerabilities, and Maintenance
Just from $13/Page
Order Essay

​The Windows disk defragmenter is a valuable tool for keeping hard drives running efficiently.

  • Explain in detail how this tool helps optimize hard drives.
  • Is the optimizing tool recommended for use with solid state drives (SSD)? Why or why not?

Windows update is a method used by Windows systems to deploy security reinforcements, software updates, and hotfixes. Often this process is performed automatically.

  • Explain the pros and cons of automatic updates.
  • Explain how to prevent automatic updates on your network. Why might you do this?

Select two of the most urgent security issues detected in Task 2, Step 8 of the Identify Security Threats and Vulnerabilities Lab and propose a solution to resolve each issue (be sure to expand the result detailed link and the suggested solution link for tips on resolving the issue).

Systems administrators aim to keep their computer systems up-to-date. Windows systems have built-in tools that systems administrators can use to fine-tune the system. A popular tool in Windows systems is the performance monitor.

  • Explain what the performance monitor does and how the information it provides helps the system administrator maintain the network.

Assessment 4: Threats, Vulnerabilities and Maintenance

Name

Systems Administration

Capella University

Professor Kuhlman

Date

Table of Contents

Optimizing Hard Drives with Disk Defragmenter……………………… …..………….. 3

Security Threat Solutions

…………………………………………………………………4

Pros and Cons of Automatic Updates ……….……..…………………………………… 4

Preventing Automatic Updates……………………………………………………………5

Windows Performance Monitor Functions and Protection . …………………………… 5

References…………..…………….. …………………..………………………………… 6

Optimizing Hard Drives with Disk Defragmenter

Explain how disk defragmenter helps optimize hard drives

Security Threat Solutions

Propose appropriate solutions to security threats identified in the lab.

Pros and Cons of Automatic Updates

Explain the pros and cons of automatic updates

Preventing Automatic Updates

Explain how and why to prevent automatic updates on a network

Windows Performance Monitor Functions and Protection

Explain how Windows Performance Monitor functions and protects a network

References

Andrews, J., Dark, J., & West, J. (2018) CompTIA A+ Guide to IT Technical Support Ninth Edition. Massachusetts: Cengage Learning.

8/4/22, 11:11 PM

Threats, Vulnerabilities, and Maintenance Scoring Guide

https://courserooma.capella.edu/bbcswebdav/institution/IT-FP/IT-FP3318/220400/Scoring_Guides/a04_scoring_guide.html 1/1

Threats, Vulnerabilities, and Maintenance Scoring Guide

CRITERIA NON-PERFORMANCE BASIC PROFICIENT DISTINGUISHED

Perform system
maintenance as
specified and
document it in a
fully complete lab
report.

Does not perform
system
maintenance as
specified and
document it in a
fully complete lab
report.

Performs system
maintenance in an
unspecified way or
with insufficient
documentation.

Performs system
maintenance as
specified and
documents it in a
fully complete lab
report.

Performs system maintenance
as specified and documents it
in a fully complete lab report,
including a brief summary of
what was learned in the lab.

Explain how disk
defragmenter helps
optimize hard
drives.

Does not explain
how disk
defragmenter
helps optimize hard
drives.

Explains how disk
defragmenter
helps optimize hard
drives, but with errors
or omissions.

Explains how disk
defragmenter
helps optimize
hard drives.

Explains how disk
defragmenter helps optimize
hard drives in great detail,
including specific examples.

Propose appropriate
solutions to security
threats identified in
the lab.

Does not propose
solutions to
security threats
identified in the lab.

Proposes
inappropriate or
insufficient solutions
to security threats
identified in the lab.

Proposes
appropriate
solutions to
security threats
identified in the
lab.

Proposes appropriate
solutions to security threats
identified in the lab in great
detail that exhibit a deep
understanding of the security
issue.

Explain the pros and
cons of automatic
updates.

Does not explain
the pros and cons
of automatic
updates.

Explains the pros
and cons of
automatic updates,
but with errors or
omissions.

Explains the pros
and cons of
automatic
updates.

Explains the pros and cons of
automatic updates in great
detail, including specific
examples.

Explain how to
prevent automatic
updates on a
network and why it
is important.

Does not explain
how and why to
prevent automatic
updates on a
network.

Explains how and
why to prevent
automatic updates on
a network, but with
errors or omissions.

Explains how and
why to prevent
automatic
updates on a
network.

Explains how and why to
prevent automatic updates on
a network in great detail,
including specific examples.

Explain how
Windows
Performance
Monitor functions
and protects a
network.

Does not explain
how Windows
Performance
Monitor functions
and protects a
network.

Explains how
Windows
Performance Monitor
functions and
protects a network,
but with errors or
omissions.

Explains how
Windows
Performance
Monitor functions
and protects a
network.

Explains how Windows
Performance Monitor
functions and protects a
network, including specific
examples.

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Confidentiality Guarantee

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

24/7 Support

Our specialists are always online to help you! We are available 24/7 via live chat, WhatsApp, and phone to answer questions, correct mistakes, or just address your academic fears.

See our T&Cs
Live Chat+1(978) 822-0999EmailWhatsApp

Order your essay today and save 30% with the discount code ESSAYHELP