What are some characteristics of systems in which you would expect application whitelisting to work well? What about systems in which you would expect it to not work well?

What will be an ideal response?


Application
whitelisting
works
particularly
well
on
systems
that
do
not
often
have
their
software
changed.
These
systems
are
typically
dedicated
to
very
specific
functions:
ATM
machines,
database
servers,
LDAP
servers,
and
so
on.
Application
whitelisting
is
hardest
on
user
workstations,
as
users
often
want
or
need
to
install
new
software,
and
workstations
generally
have
a
wide
variety
of
software
requiring
periodic
patches.

Computer Science & Information Technology

You might also like to view...

________ is the standardized way for a sending domain to identify and assert the mail senders for a given domain.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ________ file is typically about one-tenth the size of a CD file

A) AAC B) MP3 C) WAV D) MIDI

Computer Science & Information Technology

When you create a form in Design view, the ________ are NOT automatically grouped in a stacked or tabular layout

A) controls B) groupings C) properties D) stacks

Computer Science & Information Technology

You can choose to display search results only from the web.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology