1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rewona [7]
3 years ago
11

A company has several internal-only, web-based applications on the internal network. Remote employees are allowed to connect to

the internal corporate network with a company-supplied VPN client. During a project to upgrade the internal application, contractors were hired to work on a database server and were given copies of the VPN client so they could work remotely. A week later, a security analyst discovered an internal web-server had been compromised by malware that originated from one of the contractor’s laptops.
Which of the following changes should be made to BEST counter the threat presented in this scenario? (choose one and why)

1. Create a restricted network segment for contractors and set up a jump box for the contractors to use to access internal resources.
2. Deploy a web application firewall in the DMZ to stop Internet-based attacks on the webserver.
3. Deploy an application layer firewall with network access control lists at the perimeter, and then create alerts for suspicious Layer 7 traffic.
4. Require the contractors to bring their laptops on site when accessing the internal network instead of using the VPN from a remote location.
5. Implement NAC to check for updated anti-malware signatures and location-based rules for PCs connecting to the internal network.
Business
1 answer:
aalyn [17]3 years ago
7 0

Answer:

The changes to BEST counter the threat presented in this scenario is  Implement NAC to check for updated anti-malware signatures and location-based rules for PCs connecting to the internal network.

Explanation:

Implementing Network access Control NAC to check for updated anti-malware signatures and location-based rules for PCs connecting to the internal network.Network Access Control (NAC) is the best reedy that will not alter the existing work schedule in place.

This approach to computer security will unify endpoint security technology such as antivirus, host intrusion prevention, and vulnerability assessment for all users and foster stronger system authentication.

NAC will reinforce and strengthen the network security in order to prevent internal server issues from any contractor or employee henceforth.

You might be interested in
This graph shows the US unemployment rate from Aug 2010 to Nov 2011... what question could best help the economist answer
kari74 [83]
I think it might be b
4 0
3 years ago
Mickey and Jenny Porter file a joint tax return, and they itemize deductions. The Porters incur $2,300 in investment expenses. T
Veseljchak [2.6K]

Answer:

$3500 is deductible

Explanation:

The question is not complete . Please see the solution below :

The Investment Interest expense can be set off against Net Investment income ( Interest income - Investment expenses i.e $25000-$2000=$23000) to the extent and the remaining is carried forward to the next year. so here the investment interest expense is wholly set off against the interest income i.e $3500 is deductible

4 0
4 years ago
Monopolist can produce at a constant average​ (and marginal) cost of
ankoles [38]
A monopolist can produce at a constant average (and marginal<span>) </span>cost of<span> AC = MC = $5</span>
8 0
3 years ago
Infrastructure is the basic structure used to support an entire __________. A. city B. economy C. government D. population asap
Dvinal [7]

The answer that best fits the blank space in the question is (A) city.

Infrastructure generally refers to <em>the essential facilities and systems that serve an area, which can apply to a city, country, or even smaller regions such as a village</em>.

Infrastructure does not only apply to physical structures such as roads and water supplies, but also to things such as educational programs and emergency services.

3 0
3 years ago
Read 2 more answers
Over the course of 40 years, Sal grew his company to six package shipping stores. with his retirement approaching and the increa
Pavel [41]

Answer:

<em>C. defensive strategy </em>

Explanation:

<em><u>Defensive strategy</u></em><em> </em><em> is been represented by the effort of Sal's reduction</em>.

Basically in defensive strategy, the consumers and the customers are been hold-back by the companies and organisations. In this when competition increases the companies try to pull back their old customers from their competitors company.

In the scenario which is been represented in the question the Sal's company indulge's in the action that is known as defensive strategy.

7 0
3 years ago
Other questions:
  • Nicholas Manufacturing just announced yesterday that its fourth quarter earnings will be 10% higher than last year's fourth quar
    13·1 answer
  • Compton Corporation, with operations throughout the country, will soon allocate corporate overhead to the firm's various respons
    9·1 answer
  • Determine the required rate of return for Johnson and Johnson​, assuming the geometric growth rate was 13.04​% for the period​ 2
    11·2 answers
  • Do you think celebrities should weigh in on politics? Why or why not?
    14·1 answer
  • This is the "T &amp; D method that permits participants to assume roles such as president, controller, or marketing vice-preside
    13·1 answer
  • If a treasury note has a bid price of $996.25, the quoted bid price in the wall street journal would be _________. none of the o
    9·1 answer
  • Prepare the schedule of cost of goods manufactured for Barton Company using the following information.
    15·1 answer
  • Ken Larch is a tailor. He bought two industrial sewing machines from his father. He placed both machines in service in the same
    10·1 answer
  • Positive outcomes of entrepreneurship in marketplace
    12·1 answer
  • According to the consumer behavior model, what are the major categories of influence on the purchase decision process
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!