Your network uses a standard image with a HIDS and anti-malware software for all computers. The network recently suffered some malware attacks, and the CIO has tasked you with determining how to keep the attacks from reoccurring. Which of the following items should you do first?
A. erform vulnerability assessment of the standard image, and remediate findings.
B. Install a HIPS on all systems.
C. Install a NIDS.
D. Deploy a NIPS.
A
Explanation: Not only is this the least costly option to start with, it makes sense to check the image first.
You might also like to view...
What is the chief disadvantage of optical fiber as opposed to copper wiring?
What will be an ideal response?
You must be the root user to use the GNOME Control Center.
Answer the following statement true (T) or false (F)
The _____________________ link property means that after a link has been clicked, it appears the same as before it was clicked.
Fill in the blank(s) with the appropriate word(s).
To update records using an update query, enter the field to be updated in the design grid, enter any necessary criterion, and then click the ____ button to update the records.
A. Run B. View C. Execute D. Update