1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serhud [2]
3 years ago
12

Your company is experiencing an increase in malware incidents. Your manager is asking for advice on how best to verify that comp

any-owned workstations are up-to-date with security patches, anti-malware requirements, and software application updates. The manager is also concerned that employee-owned devices connecting to the corporate LAN have the same level of security as the company devices.
Which of the following protections and services should you recommend?
a. Implement a firewall with packet inspection.
b. Implement an intrusion detection system appliance.
c. Implement an endpoint management server appliance.
d. Implement an intrusion prevention system.
Computers and Technology
1 answer:
zepelin [54]3 years ago
7 0

Answer:

Option C.

Explanation:

The company is witnessing a spike in incidents involving malware. The boss is looking for advice on the best way to check that corporate-owned desktops are up-to-date regarding security updates, anti-malware standards and software or application updates. The boss is also worried that somehow the staff-owned gadgets that link to the corporate Local area network use the same level of protection as the devices in the corporation.

So, the user implements security and resources from endpoint management system appliance.

You might be interested in
A third party that provides a computer system such as Windows, programming applications, databases, and web servers is demonstra
Lostsunrise [7]

Answer:

Paas

Explanation:

I hope I helped!

6 0
2 years ago
What is statement used to communicate ones feelings in a nonconfrontational manner
makkiz [27]

"I am" statements are very well to communicate with people about your feelings in a non confrontational manner.


6 0
3 years ago
7.4.1C The global distribution of computing resources raises issues of equity, access, and power. Briefly describe one of these
nika2105 [10]

It has been accentuated. An organization is a system consisting of: people, material resources and information, being the last, the nerve center of the previous two that allows the survival of these. This statement refers to the most recent conceptions defended by the Information Management (IM), in the sense that organizations should be considered primarily as information systems.

Lynda Woodman's definition of IM states that "management is everything that refers to obtaining the right information, for the right person, at the right price, at the right time and place, to make the right decision."

As for the MIR, part of the assumption of recognition that information is a resource, a value that should be managed like any other, because among the similar characteristics we have:

* acquired at a cost and chargeable in money

* has specific and measurable characteristics

* control of the cost of information,

* has a life cycle,

* ability to be processed and refined, etc.

For Elizabeth Adams "the MIR is a function of top management, to develop a series of policies, programs and procedures to effectively and effectively plan, manage and control the information needs and support resources of information management." In this directive task, the components that participate and the areas in which the person responsible for it must operate are:

1.- information resources: that is, identification, evaluation and use of these, not only internal but also external.

2.- Appropriate technology: to collect, store, retrieve or disseminate information.

3.-management: general planning, human resources, communication, accounting and marketing.

In today's world, there is a tendency to grant special treatment to everything that is related to information; and it is this situation that gives rise to the importance of the management / management of information resources (MIR).

This era of information, characterized as significant changes, flexibility, uncertainty and the "great battles" (for competitiveness, leadership, competition, reduction of uncertainty and risk, etc.), it is necessary to keep updated as soon as to the significant changes that occur in the technology of products and processes, as well as in their management and competitiveness patterns.

We live in an era where the common denominator of progress will be the wise application of information, science and technology, in the production of goods and services for the satisfaction of social needs, as well as the adequate use of resources to increase the wellbeing of society and man. In others, words, we are talking about the correct management of information.

Information management is the new name of the development. Are the professionals (librarians, documentalists) ready to accept the challenge? We believe that information professionals are in an adequate situation, have knowledge, resources, capacity and conditions to maintain a sustainable leadership in the organization of information, but they have to determine what they believe their position should be and fight for it. We must start from the basic criteria, restructure the concept of the information scientist to adapt it to the new, complex and changing needs of the organization and the community.

6 0
4 years ago
Add me on Pokemon go, my trainer code is 5584 3300 5313
evablogger [386]

Answer:

no want it

Explanation:

7 0
3 years ago
A threat actor has successfully breached the network firewall without being detected by the IDS system. What condition describes
Mamont248 [21]

Answer:

false negative

Explanation:

A false negative is a dangerous state in which the IDS (Intrusion Detection System) assumes the activity as acceptable in which the activity is actually an attack occurred on the system.

That means, the Intrusion Detection System has failed to catch the attack. This is the most dangerous state, as the systems were compromised and the network or cyber security people were unable to find the attack.

More generally, there are two types of Intrusion Detection Systems ( IDS ). Network based IDSs ( NIDS ) and Host based IDSs ( HIDS ).

5 0
4 years ago
Other questions:
  • Which is the output of the formula =AND(12>6;6>3;3>9)
    6·1 answer
  • Write a C function (NOT A COMPLETE PROGRAM)which takes three parameters which are the cost for an item in a grocery store, the q
    12·1 answer
  • Write a C program to input basic salary of an employee and calculate gross salary according to given conditions.
    11·1 answer
  • ____________________ parameters are useful in three situations: • When the value of the actual parameter needs to be changed • W
    5·1 answer
  • Consider we have n pointers that need to be swizzled, and swizzling one point will take time t on average. Suppose that if we sw
    11·1 answer
  • Describe what a Bank Run is.
    10·1 answer
  • ? Question<br> How are the Internet and the World Wide Web different from each other?
    11·1 answer
  • Write a function isCString which accepts as arguments a const pointer to a char array and an integer for the size of the array
    12·1 answer
  • What type is the combination of an integer and a string
    13·1 answer
  • In a web application, the client uses a ___________ to interact with a web server.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!