The IT team reports the EDR software that is installed on laptops is using a large amount of resources. Which of the following changes should a security analyst make to the EDR to BEST improve performance without compromising security?

A. Quarantine the infected systems.
B. Disable on-access scanning.
C. Whitelist known-good applications.
D. Sandbox unsigned applications.


Answer: C. Whitelist known-good applications.

Computer Science & Information Technology

You might also like to view...

All of the exceptions that you will handle are instances of classes that extend the __________ class.

a. IOException b. Exception c. Error d. RunTimeException

Computer Science & Information Technology

Write a Java statement or a set of Java statements to accomplish the following tasks:

Calculate the value of 2.5 raised to the power of 3, using the pow method.

Computer Science & Information Technology

FireWire supports the following speeds:

A) 33Mbps/66Mbps/133Mbps/266Mbps/300Mbps B) 66Mbps/133Mbps/533Mbps/1066Mbps C) 10Mbps/20Mbps/60Mbps/100Mbps/120Mbps D) 100Mbps/200Mbps/400Mbps/800Mbps/1200/1600/3200Mbps

Computer Science & Information Technology

Critical Thinking QuestionsCase 2-1Leo, owner of Leo's Bread Company, recently installed Excel 2010 and created a new workbook to track sales of different types of bread. He wants to determine which types of bread are the most popular among his customers. He is particularly interested in sales of rye bread, onion rolls, and bagels. Leo has formatted the sales numbers with the Accounting number format. Leo wants the sales numbers for rye bread, onion rolls, and bagels to look different each time the sales for each exceeds $500. What Excel feature can Leo use to accomplish this? a.Spell checkerc.Point modeb.Conditional formatting d.Formulas version

What will be an ideal response?

Computer Science & Information Technology