A small startup company has hired you to harden their new network. Because funds are limited, you have decided to implement a un
ified threat management (UTM) device that provides multiple security features in a single network appliance: Firewall VPN Anti-spam Antivirus You join the UTM device to the company's Active Directory domain. The company's traveling sales force will use the VPN functionality provided by the UTM device to connect to the internal company network from hotel and airport public Wi-Fi networks. Which weaknesses exist in this implementation
Answer: The UTM represents a single point of failure
Explanation:
Unified threat management is a method used in information security which has to do with the installation of a single hardware or software that provides several security functions.
Even though it's easy to manage from a single device, the disadvantage is that within the information technology infrastructure, there is a single point of failure.
Explanation: Even though you can remember it is not really good because some hackers can track you passwords through those websites and could hack your account.