1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
exis [7]
3 years ago
13

An organization is building a new customer services team, and the manager needs to keep the tream focused on customer issues and

minimize distractions. The users have a specific set of tools installed, which they must use to perform their duties. Other tools are not permitted for compliance and tracking purposes. Team memebers have access to the internet for product lookups and to research customer issues. Which of the following should the security engineer employ to fulfill the requirements for the manager?
a. Install a web application firewall
b. Install HIPS on the team's workstations.
c. Implement containerization on the workstations
d. Configure whitelisting for the team
Computers and Technology
1 answer:
Readme [11.4K]3 years ago
7 0

Answer:

a. Install a web application firewall.

Explanation:

In this scenario, an organization is building a new customer services team, and the manager needs to keep the team focused on customer issues and minimize distractions. The users (employees) are provided with a specific set of tools (software applications) installed, which they must use to perform their duties. However, other tools (software applications) are not permitted for compliance and tracking purposes of employees who flouted the rules made by the management. Also, team members are able to access the internet for purposes such as, product lookups and to research customer issues.

In order to keep the team focused on customer issues and minimize distractions, the security engineer should install a web application firewall.

A web application firewall is an application firewall that can be used for monitoring, filtering, blocking or denial of bidirectional packets (http traffics); to and from websites or web applications.

When a web application firewall is properly implemented and configured by the security engineer, it inspects all http traffics and provides adequate protection against cookie poisoning, security misconfigurations, SQL injection, broken authentication, cross-site scripting (XSS), file inclusion, sensitive data leaks, buffer overflow etc.

Basically, the web application firewall primarily prevents an application layer (layer 7 of the OSI model) attacks.

Hence, to fulfil the manager's requirements, the security engineer should install a web application firewall which basically works as a reverse proxy protecting the web server from vulnerabilities or potential attacks.

You might be interested in
3. Megan and her brother Marco have a side business where they shop at flea markets, garage sales, and estate
Neko [114]

Answer:

a

Explanation:

Megan doesn't have a registered business. She can't claim insurance

4 0
3 years ago
In the Happy Valley School System, children are classified by age as follows: less than 2, ineligible 2, toddler 3-5, early chil
sasho [114]

// C++ switch

// It can also be used for JAVA, C#

switch(age){

// here age will be sent by the function in which it is used

// case to check the age<2

case(age<2 && age>0):

// printing the line

cout<<"ineligible";

// case to check the age ==2

case(age==2):

// printing the line

cout<<"toddler";

// case to check 3-5

case(age>=3 && age<=5):

cout<<"early childhood";

// case to check 6-7

case(age==6 || age==7):

cout<<"young reader";

//case to check 8-10

case(age>=8 && age<=10):

cout<<"elementary";

// case to check 13

case(age==13):

cout<<"impossible";

//case tocheck 14-16

case(age>=14 && age<=16):

cout<<"high school";

// case to check 17 or 18

case(age==17 || age==18):

cout<<"scholar";

//case to check >18

case(age>18);

cout<<"ineligible";

// default case

default:

cout<<"Invalid age";

}

Read more on Brainly.com - brainly.com/question/12981906#readmore

5 0
3 years ago
Does the wireless signal between the cell phones require matter to travel from one phone to another?
mrs_skeptik [129]

Mobile phones transmit and receive signals using electromagnetic waves, that is, wireless signal are electromagnetic waves which can travel through a vacuum, they do not need a medium or matter.

<h3>What are electromagnetic waves?</h3>

They are generated by electrical and magnetic particles moving at the same time (oscillating).

<h3>Characteristics of electromagnetic waves</h3>

  • Network waves are electromagnetic waves.

  • A mobile phone has coverage when it receives electromagnetic waves from at least one base station.

  • They do not necessarily require a material medium for their propagation.

Therefore, we can conclude that electromagnetic waves are those that do not need a material medium to propagate and include, among others, radio, television and telephone waves.

Learn more about electromagnetic waves here: brainly.com/question/13803241

3 0
2 years ago
What kind of a computer language could PROGRAM A be referred as?
Svetlanka [38]

Answer:

A programming language is a vocabulary and set of grammatical rules for instructing a computer or computing device to perform specific tasks. The term programming language usually refers to high-level languages, such as BASIC, C, C++, COBOL, Java, FORTRAN, Ada, and Pascal.

4 0
3 years ago
A virus that propagates using the internet or another computer network is called __________.
olasank [31]
This is called a worm
8 0
3 years ago
Other questions:
  • In the database below, the arrow is pointing to a _____.<br> file<br> record<br> field<br> key field
    12·1 answer
  • There are ways to perform computer commands quickly and multiple times. <br> a. True <br> b. False
    11·2 answers
  • Help with some questions. Thank you!
    14·1 answer
  • Marginal ________ shows how much money can be made if a producer sells one additional unit of a good.
    7·2 answers
  • HELP PLEASE!!! I do online school, someone is in another state wanting to help me. No not do my work for me but view what I view
    6·1 answer
  • How many of you got the right answer from this app​
    8·1 answer
  • A pedometer treats walking 2,000 steps as walking 1 mile. Write a program whose input is the number of steps, and whose output i
    14·1 answer
  • A computer is defined by 4 specific criteri. Select all 4.*
    10·1 answer
  • Here’s my last question
    12·2 answers
  • The arrangement of keys on a keyboard, QWERTY reflects the keyboard layout by ________. Group of answer choices using the letter
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!