1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serhud [2]
3 years ago
12

Your company is experiencing an increase in malware incidents. Your manager is asking for advice on how best to verify that comp

any-owned workstations are up-to-date with security patches, anti-malware requirements, and software application updates. The manager is also concerned that employee-owned devices connecting to the corporate LAN have the same level of security as the company devices.
Which of the following protections and services should you recommend?
a. Implement a firewall with packet inspection.
b. Implement an intrusion detection system appliance.
c. Implement an endpoint management server appliance.
d. Implement an intrusion prevention system.
Computers and Technology
1 answer:
zepelin [54]3 years ago
7 0

Answer:

Option C.

Explanation:

The company is witnessing a spike in incidents involving malware. The boss is looking for advice on the best way to check that corporate-owned desktops are up-to-date regarding security updates, anti-malware standards and software or application updates. The boss is also worried that somehow the staff-owned gadgets that link to the corporate Local area network use the same level of protection as the devices in the corporation.

So, the user implements security and resources from endpoint management system appliance.

You might be interested in
Abigail is writing an email to Justine Swenson, a friend of her best friend, Jane, inviting her to a get-together.
olga nikolaevna [1]
To ask for her email from Jane. I hope this helps.
5 0
4 years ago
Which of the following are used to classify plutons
jok3333 [9.3K]

Answer:

Plutons are intrusive igneous rock bodies.

Explanation:

6 0
3 years ago
Which one is correct
maw [93]
Letter A is correct because I guest
7 0
3 years ago
What are html documents also called?
11Alexandr11 [23.1K]
HyperText Markup Language
4 0
3 years ago
What are the services offered by web-based email?​
slega [8]

Answer:

Web based email is a service that allows to access and use electronic mail via web browser.

It allows clients to login into the email software running on a web server to compose, send and receive, delete mails basically.

8 0
3 years ago
Other questions:
  • You create hidden form fields with the ____ element.
    9·1 answer
  • Where can you access all the formatting options for worksheet cells?
    5·1 answer
  • Trading your bicycle for a snowboard exemplifies ?
    15·1 answer
  • Which protocols are TCP/IP application layer protocols? (choose all that apply)
    5·2 answers
  • you are configuring a wireless connection on your home router. Because you live in an apartment complex, the level of security i
    5·1 answer
  • Consider a classStudent. The following code is used to create objects and access its member functions. Which statement is true a
    6·1 answer
  • Select the correct answer from each drop-down menu.
    8·1 answer
  • Is an important and necessary step that precedes object-oriented programming?
    6·1 answer
  • Which operation on a pwc requires more than idle speed?
    8·1 answer
  • Harry is creating a PowerPoint presentation and wants all the slides to have a uniform look.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!