1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UNO [17]
3 years ago
14

Specifically, you will write two policies to ensure web server software and web browsers are secure. Your policy statements will

describe the goals that define a secure application. Consider the following questions for web server software and web browsers: 1. What functions should this software application provide? 2. What functions should this software application prohibit? 3. What controls are necessary to ensure this applications software operates as intended? 4. What steps are necessary to validate that the software operates as intended? Tasks Create two policies—one for web server software and one for web browser clients. Remember, you are writing policies, not procedures. Focus on the high-level tasks, not the individual steps. Use the following as a guide for both policies: ▪ Type of application software ▪ Description of functions this software should allow ▪ Description of functions this software should prohibit ▪ Known vulnerabilities associated with software ▪ Controls necessary to ensure compliance with desired functionality ▪ Method to assess security control effectiveness
Computers and Technology
1 answer:
erik [133]3 years ago
4 0

Answer:

Navigate to Prohibit Software from the Inventory tab. This will list the details of all the software that are already prohibited.

Click Add Prohibited Software. This will open the Add Prohibited Software dialog listing all the software detected in the managed computers. You should have scanned the Windows systems at least once to have the details of the software here.

Select the software that you wish to prohibit and move them to Prohibited List.

Note: In case you have grouped certain software and you are adding that Software

You might be interested in
P2p networks are most commonly used in home networks. <br> a. True <br> b. False
postnew [5]
<span>The statement that P2P networks are most commonly used in home networks is true. 
</span>P2P stands for peer-to-peer communication network. It is an example of local administration. <span> Two or more PCs share files and access to devices such as printers without requiring a separate server computer or server software with P2P type of network.</span>
6 0
3 years ago
Which of the following is typically used in a flowchart to indicate a decision?
Vilka [71]
Diamond is typically used in a flowchart or indicate a decision.
6 0
3 years ago
Driving is expensive. Write a program with two inputs, a car's miles/gallon and the cost of gas/gallon both represented as doubl
Nataly_w [17]

Answer:33

Explanation:

6 0
3 years ago
Isabel is creating a wireframe. She has drawn a layout for the home page along with outlining the navigation elements. She now w
Juli2301 [7.4K]

Answer: Filler content

Explanation: I think what the question is getting at is using filler content. This includes filler images and sample text. Once the website is all set up, the filler content is replaced with the actual content.

3 0
3 years ago
Read 2 more answers
You are building a computer from spare parts in the office. You build the computer and realize you have several different types
san4es73 [151]

Answer:

The pin count is the same

Explanation:

5 0
3 years ago
Other questions:
  • What is the basic purpose of Google calendar?
    14·2 answers
  • Effective character encoding requires:
    8·1 answer
  • How can you keep your files organized on your computer?
    13·2 answers
  • How is the EF​ computed? A. ES​ + Activity time B. LF minusActivity time C. ​Min{LS of all immediate following​ activities} D. ​
    11·1 answer
  • Write a program that performs the following tasks: Display a friendly greeting to the user Prompt the user for the value to conv
    13·1 answer
  • Isa wants to find out if his co-worker Alexis is available for an event on Wednesday, February 10th. Which calendar
    12·1 answer
  • Briefly describe the traditional definition of the digital divide. What is it and who is affected, positively and adversely? How
    15·1 answer
  • ASAP BRAINLIEST!!!
    6·1 answer
  • Explain the two filter options available when filtering by a column
    14·2 answers
  • Briefly list four of the basic I/O interface standard? ​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!