1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
exis [7]
3 years ago
13

An organization is building a new customer services team, and the manager needs to keep the tream focused on customer issues and

minimize distractions. The users have a specific set of tools installed, which they must use to perform their duties. Other tools are not permitted for compliance and tracking purposes. Team memebers have access to the internet for product lookups and to research customer issues. Which of the following should the security engineer employ to fulfill the requirements for the manager?
a. Install a web application firewall
b. Install HIPS on the team's workstations.
c. Implement containerization on the workstations
d. Configure whitelisting for the team
Computers and Technology
1 answer:
Readme [11.4K]3 years ago
7 0

Answer:

a. Install a web application firewall.

Explanation:

In this scenario, an organization is building a new customer services team, and the manager needs to keep the team focused on customer issues and minimize distractions. The users (employees) are provided with a specific set of tools (software applications) installed, which they must use to perform their duties. However, other tools (software applications) are not permitted for compliance and tracking purposes of employees who flouted the rules made by the management. Also, team members are able to access the internet for purposes such as, product lookups and to research customer issues.

In order to keep the team focused on customer issues and minimize distractions, the security engineer should install a web application firewall.

A web application firewall is an application firewall that can be used for monitoring, filtering, blocking or denial of bidirectional packets (http traffics); to and from websites or web applications.

When a web application firewall is properly implemented and configured by the security engineer, it inspects all http traffics and provides adequate protection against cookie poisoning, security misconfigurations, SQL injection, broken authentication, cross-site scripting (XSS), file inclusion, sensitive data leaks, buffer overflow etc.

Basically, the web application firewall primarily prevents an application layer (layer 7 of the OSI model) attacks.

Hence, to fulfil the manager's requirements, the security engineer should install a web application firewall which basically works as a reverse proxy protecting the web server from vulnerabilities or potential attacks.

You might be interested in
Two technicians are discussing the lower-end operation of an engine. Technician A says that power loads result from the expansio
notka56 [123]

Answer:

It's Both are correct.

Explanation:

I've taken test

6 0
3 years ago
Write a program that reads an integer, a list of words, and a character. The integer signifies how many words are in the list. T
MrMuchimi

In python 3.8:

user_input = input().split()

x = user_input[0]

char = user_input[-1]

for w in range(1,int(x)+1):

   if char in user_input[w]:

       print(user_input[w])

I hope this helps

7 0
3 years ago
A computer on a network that is not the server​
katrin [286]

Answer:

A peer-to-peer network is one in which two or more PCs share files and access to devices such as printers without requiring a separate server computer or server software. ... A P2P network can be an ad hoc connection—a couple of computers connected via a Universal Serial Bus to transfer files.

5 0
3 years ago
What term is used to describe the process of monitoring operating results and comparing actual results with the expected results
s344n2d4d5 [400]

Answer:

controlling

Explanation:

hope this helps

7 0
3 years ago
Consider the unsigned decimal number 35. What is the value in hexadecimal?<br><br> 1. 3510 = ____ 16
Liula [17]

Answer:

23_{16}

Explanation:

When we convert any decimal number into the hexadecimal number we have to divide that number with 16.

Now according to question the decimal number is 35.

Now to convert this in hexadecimal divide it with 16.

\frac{35}{16} =2\frac{3}{16}

This means the quotient is 2 and the remainder is 3.

Therefore the value of hexadecimal is,

23_{16}

Therefore,

35_{10}=23_{16}.

 

8 0
3 years ago
Other questions:
  • Every time you are asked to work with others, you are being asked to:
    6·2 answers
  • What runs horizontally and is identified with numbers?
    12·2 answers
  • A Windows application which demands a lot of raw processing power to execute repetitive complex calculations is a good candidate
    9·1 answer
  • 2 (01.01 LC)
    5·1 answer
  • __________ is the order of arrangement of files and folders.
    6·1 answer
  • A computer operating system software manufacturer invests its profits in creating newer versions of its operating system softwar
    7·1 answer
  • Apex
    5·2 answers
  • Convert each of the fo" wing base ten representations to its equivalent binary form a. 6 b. 13 C. d. 18 e. 27
    6·1 answer
  • Setting up a desktop computer for anAutoCADspecialist who needs a minimum of 125 GBram which operating system would be the best
    5·1 answer
  • Can you guys give some samples of STEM-related studies?​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!