How can you counter VBScript vulnerabilities if you are administering a network?

What will be an ideal response?


If you are administering a network:* Do not allow users to use IE or Outlook.* Have standardized bookmark files of approved sites and an updated ACL of approved and unapproved domains on the gateway router.* Run a centrally administered antivirus application across all of the Windows machines in the network.* Run an intrusion-detection system that closes down the network access of any machine that starts mass-mailing anything.

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT one of the skills you need as a forensic investigator?

A) Knowledge of proper investigative techniques B) Knowledge of the person's intent C) Knowledge of computer technology D) Knowledge of legal issues

Computer Science & Information Technology

The input type ____ is used to create a submit button.

A. submit B. send C. reset D. button

Computer Science & Information Technology

The systems development life cycle (SDLC) is the overall process of developing, implementing, and retiring information systems through a multistep approach-from initiation to use. __________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Hannah wants to create a record keeping system to track the inventory needed to efficiently run her lawn and landscape business, such as spare parts, gas cans, string trimmers, etc.  Her crew manager will also be using the system. Hannah is considering whether to use Excel or Access.  Which one of the following is NOT a benefit of using Access?a. More data storageb. Multiuser capabilityc. It's easier to set up a relational database than a spreadsheetd. More reporting features

What will be an ideal response?

Computer Science & Information Technology