1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali [406]
2 years ago
10

The users in your organization bring their own mobile devices to the office and want to be able to access the network with them.

You want to protect your network from malware threats that might be on these devices. You want to make sure these devices meet certain requirements before they can connect to the network. For example, you want them to meet the following criteria: Hardware and Windows startup components are clean. The kernel is not infected with a rootkit. Boot drivers are clean. Which Windows feature can you use to protect your network from malware threats that might be on your users' mobile devices
Computers and Technology
1 answer:
Afina-wow [57]2 years ago
4 0

Answer:

The Windows feature that can be used to protect a network from malware threats that might be on the network user's mobile devices is;

Device Health Attestation (DHA)

Explanation:

Device Health Attestation (DHA) is a feature introduced in version 1507 of widows 10 that enables increased security of the network of enterprises to have mainly hardware which are attested and monitored using cloud based service health check or DHA service on Windows Server 2016.

Device Health Attestation carries out assessments on devices based on Windows 10 devices and Windows 10 mobile devices that work with TPM 1.2 or 2.0 and devices which are within the premises

Items checked include boot configuration and attributes such as Secure Boot, ELAM, and BitLocker

Corrective action are triggered by Mobile Device Management (MDM) based on report data from the DHA.

You might be interested in
To enable grammar correction in powerpoint, you must first enable office ____ services.
sesenic [268]

Answer:

Grammar

Explanation:

8 0
1 year ago
Read 2 more answers
Peter is a data analyst in a financial firm. He maintains a spreadsheet that contains all employee details. Peter wants to analy
Mars2501 [29]

Answer:

The option B is correct. Filter the data of employees with more than five years of experience.

Explanation:

Filter is a feature in spreadsheets which let you see the data required to see based on some condition. Only the filtered data is shown and other is skipped for current view. So if there is any column in spreadsheet for employees experience than filter it with the selecting the filter to more than five years. Less than five and 5 option will be unchecked and other remain checked.

I hope it will help you!

6 0
3 years ago
What is a Caesar cipher? As part of your answer demonstrate encrypting the plaintext messages: CS IS COOL with a caesar cipher.
sweet [91]

Answer:

A Caesar Cipher is a basic encryption type.

Explanation:

Its implementation is very easy and straightforward. It uses a one-to-one of characters in a character set. The input needed is the plain-text message and the encryption number.

For example, using the character set A-Z, encrypting the text CS IS COOL using the key of 3 generates FV LV FRRO. What has been done here is to take each character in the plain-text message and move it by "encryption number steps" in the character set.

8 0
3 years ago
Write code that inserts useritems into the output string stream itemsoss until the user enters "exit". each item should be follo
Yuliya22 [10]
If user output is ''red purble yellow exit'': red purple yellow  import java.util.Scanner;  import java. io.PrintWriter;  import java. io.StringWriter;    public class StringStreamOutput {   public static void main (String [] args) {   Scanner snr = new Scanner(Scanner.in);   Stringuseritem = '''';    StringWriter itemcharStream = new StringWriter();  PrinterWriter itemsOSS = new PrintWriter(itemcharStream);    System.out.printIn(''Enter items (type Exit to open):'');  useritem = scnr.next();    while (!userItems.Equals(''Exit'')) {  /*Your solution goes here*/     UserItem = scnr.nxt();    }     useritem = itemCharStream.toString()   System.out.printin(useritem);     return;     }    }
5 0
3 years ago
When utilizing the Internet Storage Name Service (iSNS), how can you limit which targets iSCSI initiators can discover and conne
Sati [7]

Answer:

You can limit by devices IQN, DNS name, MAC address, IP address

Explanation:

When you configure an iSCSI target, you define which iSCSI initiators can connect to an iSNSI by the client's IQN. You can also specify which servers can connect to the iSCSI target based on MAC addresses, IP address, and DNS name.

6 0
3 years ago
Other questions:
  • How can i appear offline without fb messenger saying "last active 1 minute ago"?
    5·1 answer
  • So for my Game Design class I have a quiz coming up...I was wondering if someone could answer some of these practice questions,
    7·2 answers
  • Settings to control the amount of notifications is a
    10·2 answers
  • What is the best application to create a slide show presentation?
    13·2 answers
  • A(n) ________ moves over the spinning platters to retrieve data from the hard disk.
    6·1 answer
  • A solid understanding of __________ is the foundation of verbal communication
    7·1 answer
  • To move an object to the bottom of the stack, click the Send Backwards arrow and then click Send to Back in the Arrange group on
    7·1 answer
  • Please hurry!
    15·2 answers
  • Which of the following best describes your sequence of actions when developing a web page?
    12·1 answer
  • 1,2,3,4,5,6,7,8,9,10 – Best case - Sorted in ascending order
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!