How can you counter VBScript vulnerabilities if you are administering a network?
What will be an ideal response?
If you are administering a network:* Do not allow users to use IE or Outlook.* Have standardized bookmark files of approved sites and an updated ACL of approved and unapproved domains on the gateway router.* Run a centrally administered antivirus application across all of the Windows machines in the network.* Run an intrusion-detection system that closes down the network access of any machine that starts mass-mailing anything.
You might also like to view...
Which of the following is NOT one of the skills you need as a forensic investigator?
A) Knowledge of proper investigative techniques B) Knowledge of the person's intent C) Knowledge of computer technology D) Knowledge of legal issues
The input type ____ is used to create a submit button.
A. submit B. send C. reset D. button
The systems development life cycle (SDLC) is the overall process of developing, implementing, and retiring information systems through a multistep approach-from initiation to use. __________
Answer the following statement true (T) or false (F)
Hannah wants to create a record keeping system to track the inventory needed to efficiently run her lawn and landscape business, such as spare parts, gas cans, string trimmers, etc. Her crew manager will also be using the system. Hannah is considering whether to use Excel or Access. Which one of the following is NOT a benefit of using Access?a. More data storageb. Multiuser capabilityc. It's easier to set up a relational database than a spreadsheetd. More reporting features
What will be an ideal response?