1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UNO [17]
3 years ago
14

Specifically, you will write two policies to ensure web server software and web browsers are secure. Your policy statements will

describe the goals that define a secure application. Consider the following questions for web server software and web browsers: 1. What functions should this software application provide? 2. What functions should this software application prohibit? 3. What controls are necessary to ensure this applications software operates as intended? 4. What steps are necessary to validate that the software operates as intended? Tasks Create two policies—one for web server software and one for web browser clients. Remember, you are writing policies, not procedures. Focus on the high-level tasks, not the individual steps. Use the following as a guide for both policies: ▪ Type of application software ▪ Description of functions this software should allow ▪ Description of functions this software should prohibit ▪ Known vulnerabilities associated with software ▪ Controls necessary to ensure compliance with desired functionality ▪ Method to assess security control effectiveness
Computers and Technology
1 answer:
erik [133]3 years ago
4 0

Answer:

Navigate to Prohibit Software from the Inventory tab. This will list the details of all the software that are already prohibited.

Click Add Prohibited Software. This will open the Add Prohibited Software dialog listing all the software detected in the managed computers. You should have scanned the Windows systems at least once to have the details of the software here.

Select the software that you wish to prohibit and move them to Prohibited List.

Note: In case you have grouped certain software and you are adding that Software

You might be interested in
A point is named by a lowercase letter. <br> a. True<br> b. False
Alik [6]
That is B False m8 that means mate btw xD please say thank you :P
4 0
3 years ago
Read 2 more answers
Write a python program to calculate the length of any string recursively​
Solnce55 [7]

Answer:

b

Explanation:

6 0
2 years ago
What are threats to computer system
4vir4ik [10]
Breach..
bugs and viruses
hack
3 0
3 years ago
Read 2 more answers
File "f2" has a size of 2. Why? A. It contains the string "f1". B. It contains two blank lines.
Aneli [31]

Answer:

A. It contains the string "f1"

7 0
3 years ago
+20 POINTS!!!~~~~~When adding delegates to his mailbox, which role should Joel use if he would like the user to be able to read
DochEvi [55]

Answer:

b on edge

Explanation:

4 0
3 years ago
Other questions:
  • You have implemented a network where hosts are assigned specific roles, such as for file sharing and printing. Other hosts acces
    7·1 answer
  • You are able to change the formatting of a table after it is inserted into a placeholder. True or false
    9·2 answers
  • In this part, you have to implement a linked list that maintains a list of integers in sorted order. Thus, if the list contains
    13·1 answer
  • Hey does anybody know how to delete history on a school-issued chrome book, I tried to delete it but it won't let you clear your
    7·1 answer
  • Which heat transfer can be described as currents of warm air rising and cool air falling
    12·1 answer
  • Describe the 3 different types of authentication
    6·2 answers
  • What is Function of print statement?
    8·2 answers
  • How are logical operators used?
    14·1 answer
  • Most network behavior analysis system sensors can be deployed in __________ mode only, using the same connection methods as netw
    8·1 answer
  • Why are computers better than humans at solving a problem like finding the shortest route between ten different cities?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!