Answered step by step
Verified Expert Solution
Link Copied!

Question

00
1 Approved Answer

Match the risk mitigation tool or technique to the vulnerability: User opens unknown email attachment - A. B. C. D. E. Operating system has known

Match the risk mitigation tool or technique to the vulnerability:

User opens unknown email attachment

- A. B. C. D. E.

Operating system has known vulnerability

- A. B. C. D. E.

High volume employee Internet traffic degrades network performance

- A. B. C. D. E.

DDos attack from off-site hackers

- A. B. C. D. E.

Company is losing good employees to other jobs because they can't work from home.

- A. B. C. D. E.

where: -

A.Make sure security patches are up to date

B.Install web filtering

C.Email filtering and quarantine

D.Implement VPN with secure encrypted communication

E.Implement IDS system

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

What is the display control for a Yes / No data type?

Answered: 1 week ago