1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreyandreev [35.5K]
2 years ago
5

You are implementing a new application control solution. Prior to enforcing your application whitelist, you want to monitor user

traffic for a period of time to discover user behaviors and log violations for later review. How should you configure the application control software to handle applications not contained in the whitelist?
Computers and Technology
1 answer:
shepuryov [24]2 years ago
5 0

Answer: Flag

Explanation:

When using an application control solution, it should be noted that the application whitelist is typically centrally defined which is applied to the network devices. In such case, the applications that are contained in the whitelist will be the only one that are allowed.

Therefore, the applications that are not contained in the whitelist should be flagged. This is necessary in order to effectively monitor the user traffic for a period of time in order to discover user behaviors.

You might be interested in
Vitamins and minerals dissolve easily in water.True or false?
noname [10]
True vitamins and minerals dissolves in water
8 0
3 years ago
Research the topic of legal and ethical behaviors or dilemmas related to technology. Identify five topics of concern and briefly
max2010maxim [7]

Answer:

if you push alt and f4 at the same time it will automatically put the right answer.

Explanation:

7 0
3 years ago
13) What are the benefits and detriments of each of the following? Consider both the systems and the programmers’ levels. a. Sym
dsp73

Answer:

Automatic and Explicit Buffering.

In the case of explicit buffering, the length of the queue is provided while in automatic buffering the queue size needs to be indefinite. In automatic buffering there is no need to block the sender while coping the message. While in explicit buffering the sender is blocked for the space in queue.

No memory is being wasted in explicit buffering.

Send by Copy and Send by Reference.

By using the send by copy method, the receiver is not able to change the state of parameter while send by reference allow. The advantage of using the send by reference method is that it allows to change a centralized application to its distributed version.

Fixed-sized and Variable-sized Messages.

In fixed size messaging refers, the buffer size is fixed. This means only a particular number of messages can only be supported by the fixed size buffer. The drawback of the fixed size messages is that they must be a part of fixed size buffer. These are not a part of variable size buffer. The advantage of variable size message is that the length of the message is variable means not fixed. The buffer length is unknown. The shared memory is being used by the variable size messages.

Explanation:

5 0
3 years ago
Corey wrote a code that will display his name every time he presses the down arrow key but there is a bug in it. Display letter
brilliants [131]

Answer:

Explanation:

display letter c, type letter r, type letter o, type letter 3, type letter y- i think thats it but i dee cay this is confusing

7 0
3 years ago
Your enterprise LAN uses a VPN so that users working from home can access shared Windows folders in the office, but it doesn't w
Alona [7]

Explanation:

Rather than use LAN or VPN remote connections, cloud services may be a better option to use. They could focus on using alternate remote file access services such as Google Drive, Dropbox, etc. Using these alternative services would be best suitable for unreliable or limited internet connections.

Also, it would be best if remote users download/store important folders when in an area having a stable internet connection.

6 0
3 years ago
Other questions:
  • What is the opening page of a website called?
    9·2 answers
  • What is an enterprise system
    14·2 answers
  • Which of the following statements best compares and contrasts the role of story writers and script writers
    12·1 answer
  • Which DHCPv4 message will a client send to accept an IPv4 address that is offered by a DHCP server? (Points : 5) Unicast DHCPACK
    8·1 answer
  • Write a program to read 10 integers from an input file and output the average, minimum, and maximum of those numbers to an outpu
    14·1 answer
  • How do media and networks interact? A. Networks and media work in exactly the same way. B. Media are connected to networks that
    8·1 answer
  • All NATE specialties are offered at two levels, A. journeyman and master. B. installation and service. C. apprentice and journey
    7·1 answer
  • An array, numbers, of integers is filled with 100 random numbers whose values are greater than 10 and less than 255. You DO NOT
    7·1 answer
  • In needs analysis: Group of answer choices the costs of different physical network design alternatives are assessed the rate of
    10·1 answer
  • Dominic list his camera for sale on an online auction site Chloe is the highest bitter and purchase as the camera how does the a
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!