You are on page 1of 2

STE-ICT (Computer System Servicing)

Set Router/WiFi/Wireless Access Point/Repeater Configuration


(Network Inspection Procedures)
David Rey I. Luna Grade 10 STE-Polaris
IV. Exercise/Activities
A. Assessment
1. F 6. T
2. T 7. T
3. T 8. F
4. F 9. F
5. T 10. T
B. Let’s ask Mr. Google
Importance of Disk Cleanup and when to apply it
 Disk Cleanup helps free up space on your hard disk, creating improved system performance. Disk
Cleanup searches your disk and then shows you temporary files, Internet cache files, and unnecessary
program files that you can safely delete. You can direct Disk Cleanup to delete some or all of those files.
 Running Disk Cleanup at least once a month is an excellent maintenance task and frequency.
Advantages and Effects to the computer system
1. Organizing your files helps your computer perform faster. It also lessens time of searching for files that you
usually need.
2. Performing a disk cleanup helps detect junk files which usually takes a lot of disk space.

3. Cleaning up your hard drive frees more space for more important files to be stored.

4. Viruses and malwares are removed after you perform a full system scan.

5. Checking errors on your PC helps you get rid of bad sectors which causes your computer to hang.

6. Performing a registry repair regularly cleans your registry from errors which causes booting errors.

7. Cleaning your recycled bin folder helps you get rid of trash files which may contain viruses that can possibly
infect your computer if not removed right away.
D. Essay Writing
IMPORTANCE OF NETWORK INSPECTION PROCEDURE

For many organizations, the firewall is the first line of defense against outside attacks. They
help to automate the process of rejecting "bad" traffic by checking data packets for
abnormalities and blocking those packets that are identified as malicious. This is particularly
crucial for ensuring that a business remains cyber secure.

However, Network Inspection are useful for more than perimeter security. They can be
configured to filter traffic between individual assets on the network-creating defense in depth
and slowing the breakout speed of attack that begins on the network itself.

Finally, firewalls can act as a final point of defense for keeping sensitive data from leaving the
network by checking outgoing traffic. Network inspection of outgoing data packets can help
identify abnormal requests and prevent them from being completed. This, in turn, can help to
prevent data breaches-though attackers often try to find ways to prevent the firewall from
blocking this outgoing traffic.

Firewalls are a valuable addition to any network security architecture. They help to create a
simple, yet effective, way to control the flow of traffic from one part of a network to another. In
fact, anything that makes it harder for attackers to get what they want while remaining
undetected can be a worthwhile addition to a business' cybersecurity measures.

You might also like