1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali [406]
3 years ago
10

The users in your organization bring their own mobile devices to the office and want to be able to access the network with them.

You want to protect your network from malware threats that might be on these devices. You want to make sure these devices meet certain requirements before they can connect to the network. For example, you want them to meet the following criteria: Hardware and Windows startup components are clean. The kernel is not infected with a rootkit. Boot drivers are clean. Which Windows feature can you use to protect your network from malware threats that might be on your users' mobile devices
Computers and Technology
1 answer:
Afina-wow [57]3 years ago
4 0

Answer:

The Windows feature that can be used to protect a network from malware threats that might be on the network user's mobile devices is;

Device Health Attestation (DHA)

Explanation:

Device Health Attestation (DHA) is a feature introduced in version 1507 of widows 10 that enables increased security of the network of enterprises to have mainly hardware which are attested and monitored using cloud based service health check or DHA service on Windows Server 2016.

Device Health Attestation carries out assessments on devices based on Windows 10 devices and Windows 10 mobile devices that work with TPM 1.2 or 2.0 and devices which are within the premises

Items checked include boot configuration and attributes such as Secure Boot, ELAM, and BitLocker

Corrective action are triggered by Mobile Device Management (MDM) based on report data from the DHA.

You might be interested in
(40 pointsAnd brainliest answer ASAP) Maria is recording her friend’s graduation ceremony. How can Maria ensure that the video i
snow_lady [41]

Answer:

camera

Explanation:

3 0
3 years ago
NEEDED ASAP
kogti [31]

Explanation:

1. special key combination that causes specific commands to be executed typically shortcut keys combine the ctrl or alt keys with some other keys.

2. 5 example of shortcut keys are:-

  • 1. ctrl + A - select all
  • 2.ctrl + B - bold
  • 3. ctrl + C - copy
  • 4. ctrl + U - under line
  • 5. ctrl + v - paste

3. (i) open the start menu

(ii) open Windows task manager

(iii) close the currently active program

(iv) replace

(v) align center

4. the three importance of shortcut keys are :

  • efficient and time saving :- using shortcut make you more efficient at doing certain task on your computer .
  • multi-tasking :- being a multi Tasker is something required in life.
  • health benefit :- cutting down on your mouse usage by using keyboard shortcut can help reduce the risk of RSI (Repetitive Syndrome Injury).

5. shortcut keys are very helpful because it take less time. keyboard shortcuts are generally used to expedite common operation by reducing input sequence to a few keystrokes.

8 0
3 years ago
What does EDI stand for?
Georgia [21]
Electronic data interchange
4 0
3 years ago
Read 2 more answers
Given two int variables , firstplacewinner and secondplacewinner, write some code that swaps their values . declare any addition
Mekhanik [1.2K]
Int tmp;
tmp = firstplacewinner;
firstplacewinner = secondplacewinner;
secondplacewinner = tmp;
5 0
3 years ago
ASAP HELP NO GUESS A new pet store wants to design a logo to be displayed on business cards, posters in the shop’s windows, and
murzikaleks [220]

[2] JPG graphic  i hope this helps

6 0
3 years ago
Read 2 more answers
Other questions:
  • Every preprocessing directive must begin with:
    11·1 answer
  • 2
    9·2 answers
  • While waiting to be seated at a restaurant, Jason receives a customer loyalty coupon through an app on his mobile phone for half
    7·1 answer
  • if an open cut or wound is exposed to contamination washing it in hot water and hand soap is not sufficient to keep safe
    14·2 answers
  • As a computer science student, which career you will select and what do you predict about the future of that specific IT-Career.
    8·1 answer
  • Which is the correct APA format in books?​
    10·2 answers
  • Distinguish between exponentiation and modulus. Be specific.
    5·1 answer
  • Python
    7·1 answer
  • If you want to insert a table which ribbon should you select
    13·2 answers
  • If you convinced your teacher to give you an extension on an assignment, what would this situation be an example of? OA. General
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!