Forms of attack on Microsoft systems

 

 

 

1. Discuss common forms of attack on Microsoft systems using the Internet, and/or your job as reference for full credit
2. Read the week 1 article on installation and deployment of Windows Server 2012 and list 5 concerns that could result in vulnerabilities during installation.

3. Discuss three basic network components and how they are used today.

 

 

 

 

This question has been answered.

Get Answer