subject

8. Brad is a security manager and is preparing a presentation for his company's executives on the risks of using instant messaging (IM) and his reasons for wanting to prohibit its use on the company network. Which of the following should not be included in his presentation? a. Sensitive data and Files can be transferred from system to system over IM. b. Users can receive information-including malware-from an attacker posing as a legitimate sender. c. IM use can be stopped by simply blocking specific ports on the network firewalls. d. A security policy is needed specifying IM usage restrictions.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 02:00
What is the largest decimal number that can be represented by a binary number with 4 place values? (remember, each place in a binary number has a value of a power of 2, starting in the ones place with 20.)
Answers: 3
question
Computers and Technology, 22.06.2019 08:50
Can online classes such as gradpoint track your ip location like if im taking a final and i give somebody else my account and they take the final for me will it show where they are taking the final from? and can this be countered with a vpn
Answers: 1
question
Computers and Technology, 23.06.2019 22:30
Lakendra finished working on her monthly report. in looking it over, she saw that it had large blocks of white space. what steps could lakendra take to reduce the amount of white space?
Answers: 3
question
Computers and Technology, 24.06.2019 01:30
Hazel has just finished adding pictures to her holiday newsletter. she decides to crop an image. what is cropping an image?
Answers: 1
You know the right answer?
8. Brad is a security manager and is preparing a presentation for his company's executives on the ri...
Questions
question
Social Studies, 25.09.2019 05:00
question
Chemistry, 25.09.2019 05:00
question
Arts, 25.09.2019 05:00
question
Social Studies, 25.09.2019 05:00
Questions on the website: 13722362