A security administrator determined that users within the company are installing unapproved software. Company policy dictates that only certain applications may be installed or ran on the user's computers without exception.Which of the following should the administrator do to prevent all unapproved software from running on the user's computer?
A. Deploy antivirus software and configure it to detect and remove pirated software
B. Configure the firewall to prevent the downloading of executable files
C. Create an application whitelist and use OS controls to enforce it
D. Prevent users from running as administrator so they cannot install software.
Answer: C. Create an application whitelist and use OS controls to enforce it
You might also like to view...
What is not true about this code segment?
location = fileObject.tellg(); a. tellg is a member function of fileObject. b. location is a pointer. c. The value of location after the segment executes must be less than or equal to the number of bytes in the file attached to fileObject. d. fileObject is an istream object.
______ Law states that every year or two, the computing power of computers approximately doubles without any increase in price.
a) Gate’s b) Moore’s c) Henderson’s d) None of the above.
What are the advantages and disadvantages of a metaphor-based organizational scheme? Use Figure 3 from this chapter as an example.
What will be an ideal response?
Consider the following definition of the recursive function mystery.int mystery(int num){ if (num
A. 50 B. 65 C. 120 D. 180