Professional Documents
Culture Documents
Performance Tasks
Performance Tasks
Performance Tasks
1. Given that someone already infiltrated your networks (via web-based systems,
networks, or human users). As an IT practitioner, what will you do in this kind of situation?
Answer: In the event that our networks have been infiltrated by unauthorized individuals,
as an IT practitioner, I would take immediate action to contain the breach and mitigate
any potential damage.
The first thing I do is to turn off the connection to the internet. Then check the router to
know who are the connected to my router and block it if I don’t know who are they. Update
my computer and also the router that I use to prevent the hackers to gain access to my
computer or network. And also, run my anti-virus software to detect and remove the
malicious software or virus that’s installed to my computer.
Always turn on your firewall to your computer and always update your computer and all
the software or application that been installed. Daily run the anti-virus or the window
defender of the computer to detect the viruses and malicious software. Don’t installed a
crack application because it can be use by the hackers to access the networks of the
computer. Don’t open a malicious-websites because it’s also use by the hackers. Use a
unique-passwords to your networks or computer don’t share it and make it private.
3. In your own opinion, what are the factors to consider why individuals are vulnerable to
APT attacks?
Answer: In my own opinion, this is the factors why individual are vulnerable to APT
attackers: