1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UNO [17]
3 years ago
14

Specifically, you will write two policies to ensure web server software and web browsers are secure. Your policy statements will

describe the goals that define a secure application. Consider the following questions for web server software and web browsers: 1. What functions should this software application provide? 2. What functions should this software application prohibit? 3. What controls are necessary to ensure this applications software operates as intended? 4. What steps are necessary to validate that the software operates as intended? Tasks Create two policies—one for web server software and one for web browser clients. Remember, you are writing policies, not procedures. Focus on the high-level tasks, not the individual steps. Use the following as a guide for both policies: ▪ Type of application software ▪ Description of functions this software should allow ▪ Description of functions this software should prohibit ▪ Known vulnerabilities associated with software ▪ Controls necessary to ensure compliance with desired functionality ▪ Method to assess security control effectiveness
Computers and Technology
1 answer:
erik [133]3 years ago
4 0

Answer:

Navigate to Prohibit Software from the Inventory tab. This will list the details of all the software that are already prohibited.

Click Add Prohibited Software. This will open the Add Prohibited Software dialog listing all the software detected in the managed computers. You should have scanned the Windows systems at least once to have the details of the software here.

Select the software that you wish to prohibit and move them to Prohibited List.

Note: In case you have grouped certain software and you are adding that Software

You might be interested in
Write a pseudocode to add the first 100 even numbers.
Allushta [10]

Even numbers are numbers whigh are divisible by 2. Therefore, the first even number is 2. A pseudocode which adds the first 100 even numbers can be written thus :

counter = 0

sum = 0

interval = 2

while counter < 100 :

sum = sum + interval

interval += 2

counter +=1

print(sum)

  • A counter takes count of the number of values summed

  • Initializes a variable which holds the sum of even values

  • Since even numbers are divisible by 2; every factor ; increase every added value by 2

  • The program ends once counter is 100

Learn more : brainly.com/question/25327166

6 0
2 years ago
Your company collects and stores security camera footage. Within the first 30 days, footage is processed regularly for threat de
Sliva [168]

Answer:

<em>For the very first 30 days, use Google Cloud Regional Storage, then switch to Coldline Storage.</em>

Explanation:

Coldline Storage is a cost-effective, extremely durable information archiving, online backup, and disaster recovery web host.

Your information is available in seconds, not hours or days, unlike many other "cold" storage providers.

5 0
4 years ago
Digital data is _____ and analog information is _____.
Liula [17]
Digital data is discrete and analog information is continuous.
6 0
4 years ago
Suporting details gives you?
Korvikt [17]

The answer is option B "more information about the subject." Supporting details are used to support your argument in your essay, so you have more faces, and information in order to make a strong argument. Supporting details do indeed make your paragraph bigger but that's not the reason why they are used. Supporting details help you prove your claim and defend your argument against people who think the opposite way of your claim.

Hope this helps!

6 0
3 years ago
Which of the following graphs corresponds to the given function?
Julli [10]
What graphs? There are no graphs shown...
6 0
3 years ago
Read 2 more answers
Other questions:
  • The ____ shortcut keys remove character formatting. (points : 2) ctrl 0 (zero) ctrl i ctrl spacebar ctrl u
    8·2 answers
  • Write a function named sortie that takes three integer parameters by reference and rearranges them in ascending order--the first
    6·1 answer
  • Angela recently purchased a new Android smartphone. While purchasing the phone, Angela was told that she would need to set up a
    5·1 answer
  • Sometimes your Internet is slow and sluggish, what are some common problems that affect network functionality. Check all that ap
    14·1 answer
  • Given the following code fragment and the input value of 4.0, what output is generated?
    8·1 answer
  • By default, tables are sorted in ascending order by this.<br><br><br> What’s the answer?
    12·2 answers
  • Hoda needs to create a chart that is associated with an Excel spreadsheet. She needs to ensure that if the data in the spreadshe
    12·1 answer
  • By itself, the human eye cannot see anything in three dimensions. What does the passage say enables us to see the world in 3-D?
    11·2 answers
  • 49 points!
    14·1 answer
  • Why is computer called information processing machine ?????​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!