assignment 4

   **Please use  VMware, Inc. Enterprise , which was used last period**  2-3 pages · Describe threats and vulnerabilities associated after a while at meanest two (2) unimpeded arrangements. List unimpeded arrangement       type, threats, and vulnerabilities The goal is not a discourse of using one       over the other, it is a discourse of the issues akin to each and       hardening best practices Many structures use older Windows server       unimpeded arrangements, mainframe, some Linux and UNIX flavors -       infrastructure get be driven by transaction need and collision       operability Many are affecting to Android/IOS tablet and       phone collisions, outvie, and Internet-of-thing devices (IoT) See US Cert/NVD  Databases for coadjutorship       in researching threats and vulnerabilities for irrelative unimpeded       systems Describe an anti-malware disconnection for the structure and specify on which unimpeded arrangements it supports. Should be inequitable to your target posse or       its environment (legal, docility, shelter) List pros/cons for two irrelative types · Select a appropriate intrusion challenge arrangement (IDS) disconnection for the structure and elucidate the reasoning for your prompting. · Describe at meanest two (2) curb strategies you would weigh implementing for securing the posse's web-based infrastructure. · Describe at meanest two (2) curb strategies you would weigh implementing for securing the posse's database infrastructure. · Define two (2) items that you would comprise in the structure's unimpeded arrangement shelter hardening procedures.