1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
exis [7]
3 years ago
13

An organization is building a new customer services team, and the manager needs to keep the tream focused on customer issues and

minimize distractions. The users have a specific set of tools installed, which they must use to perform their duties. Other tools are not permitted for compliance and tracking purposes. Team memebers have access to the internet for product lookups and to research customer issues. Which of the following should the security engineer employ to fulfill the requirements for the manager?
a. Install a web application firewall
b. Install HIPS on the team's workstations.
c. Implement containerization on the workstations
d. Configure whitelisting for the team
Computers and Technology
1 answer:
Readme [11.4K]3 years ago
7 0

Answer:

a. Install a web application firewall.

Explanation:

In this scenario, an organization is building a new customer services team, and the manager needs to keep the team focused on customer issues and minimize distractions. The users (employees) are provided with a specific set of tools (software applications) installed, which they must use to perform their duties. However, other tools (software applications) are not permitted for compliance and tracking purposes of employees who flouted the rules made by the management. Also, team members are able to access the internet for purposes such as, product lookups and to research customer issues.

In order to keep the team focused on customer issues and minimize distractions, the security engineer should install a web application firewall.

A web application firewall is an application firewall that can be used for monitoring, filtering, blocking or denial of bidirectional packets (http traffics); to and from websites or web applications.

When a web application firewall is properly implemented and configured by the security engineer, it inspects all http traffics and provides adequate protection against cookie poisoning, security misconfigurations, SQL injection, broken authentication, cross-site scripting (XSS), file inclusion, sensitive data leaks, buffer overflow etc.

Basically, the web application firewall primarily prevents an application layer (layer 7 of the OSI model) attacks.

Hence, to fulfil the manager's requirements, the security engineer should install a web application firewall which basically works as a reverse proxy protecting the web server from vulnerabilities or potential attacks.

You might be interested in
The Healthy Nutrition Counseling Center and the Simple Solutions Software Company have recently joined forces to produce a meal
labwork [276]

Answer: (B) Strategic alliance.

Explanation:

The strategic alliance is one of the type of the agreement that help the organization for developing the effective processes. The strategic alliance basically allow associations, people or different substances to move in the direction of normal or connecting objectives.

The main advantage of the strategic alliance is that in terms of economical condition it reduces the overall, risks in the process and also reduced the costs. This technique basically include new technologies and diversifying services and the products.  

Therefore, Option (B) is correct.

5 0
3 years ago
Which one is the correct answer
STatiana [176]

the right anwser is d


3 0
2 years ago
how much should an organization consider moving into the cloud before full outsourcing starts making more business sense
PIT_PIT [208]

Answer:

47

Explanation:

capital steez

8 0
3 years ago
Read 2 more answers
Which of the following contains fair use?
Reptile [31]
The answer to your question is D
8 0
3 years ago
Jason wants to set up his Wi-Fi’s security. He cannot install a central server for authentication. However, he wants to use a pr
jolli1 [7]

Answer:

Answer = a ig

wpa. ig ig ig ig

4 0
3 years ago
Other questions:
  • Which sentence best describes an activity stream?
    10·2 answers
  • Which strategy are you using when you only read the title, section headings, and captions?
    12·2 answers
  • A​ __________ is a commonly used tool for showing how the parts of a whole are distributed.
    11·1 answer
  • How can touch typing quickly but accurately improve your earnings (the money you can make)
    15·2 answers
  • Georgenotfound??? question mark??
    15·2 answers
  • Which model emphasizes the risk analysis phase of development
    12·1 answer
  • Suppose we perform a sequence of n operations on a data structure such that if some condition C(k) holds then the kth operation
    7·1 answer
  • Which person would be the best fit for a career in the Information Technology field?
    6·2 answers
  • write code to print out all combinations of pairs of numbers 1 through m and 1 through n, separated by a comma
    10·1 answer
  • 236. A system such as a printer, smart TV, or HVAC controller, typically uses an operating system on what is called a:
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!