1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali [406]
3 years ago
10

The users in your organization bring their own mobile devices to the office and want to be able to access the network with them.

You want to protect your network from malware threats that might be on these devices. You want to make sure these devices meet certain requirements before they can connect to the network. For example, you want them to meet the following criteria: Hardware and Windows startup components are clean. The kernel is not infected with a rootkit. Boot drivers are clean. Which Windows feature can you use to protect your network from malware threats that might be on your users' mobile devices
Computers and Technology
1 answer:
Afina-wow [57]3 years ago
4 0

Answer:

The Windows feature that can be used to protect a network from malware threats that might be on the network user's mobile devices is;

Device Health Attestation (DHA)

Explanation:

Device Health Attestation (DHA) is a feature introduced in version 1507 of widows 10 that enables increased security of the network of enterprises to have mainly hardware which are attested and monitored using cloud based service health check or DHA service on Windows Server 2016.

Device Health Attestation carries out assessments on devices based on Windows 10 devices and Windows 10 mobile devices that work with TPM 1.2 or 2.0 and devices which are within the premises

Items checked include boot configuration and attributes such as Secure Boot, ELAM, and BitLocker

Corrective action are triggered by Mobile Device Management (MDM) based on report data from the DHA.

You might be interested in
What are building blocks? select three options.
mr Goodwill [35]

Answer:

Content that has been formatted

Content that is stored as templates

Content that is stored in galleries

Explanation:

These are the answers because that’s just what they are

7 0
4 years ago
How to drive more website traffic?
lidiya [134]

Hello there,

How to drive more website traffic?

Answer: Advertise

8 0
4 years ago
Which best explains the process he would follow?
nikitadnepr [17]
I think the answer is c. I just did that edginunity
7 0
4 years ago
Social engineering attacks can be carried out:______.
Alik [6]
The answer most likely B NOT SURE )
3 0
3 years ago
Pseudo code for rolling a dice
iogann1982 [59]

Answer:

Explanation:

In this exercise, you will roll a pair of dice until the numbers add up to a given number. You can assume that the given number is 2, 3, 6, or 12. Using pseudocode, write an algorithm that returns the number of times the dice is rolled to achieve this number.

3 0
3 years ago
Other questions:
  • Silver, lead, and hydrogen are examples of what type of matter?
    12·1 answer
  • A computer hacker usually gets into a companyâs network by _____.
    15·1 answer
  • What will be the result of running the code below?
    5·1 answer
  • Why are computers assigned IP addresses
    15·1 answer
  • Anna's computer has slowed down. How might she improve her computer's performance? Select one of the options below as your answe
    10·1 answer
  • Saturn has an orbital period of 29.46 years
    7·2 answers
  • The concept of the internet was developed by the u.s. department of defense as a network that ________ in event of an attack.
    8·1 answer
  • (03.04 MC) While working in a group, two members are not getting along. You ask each one what is happening, and they both say th
    7·2 answers
  • What refers to a set of instructions executed in order?
    6·1 answer
  • The (blank) option will help determine the overall look of her presentation.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!