What are some characteristics of systems in which you would expect application whitelisting to work well? What about systems in which you would expect it to not work well?

What will be an ideal response?

Application
whitelisting
works
particularly
well
on
systems
that
do
not
often
have
their
software
changed.
These
systems
are
typically
dedicated
to
very
specific
functions:
ATM
machines,
database
servers,
LDAP
servers,
and
so
on.
Application
whitelisting
is
hardest
on
user
workstations,
as
users
often
want
or
need
to
install
new
software,
and
workstations
generally
have
a
wide
variety
of
software
requiring
periodic
patches.

Computer Science & Information Technology

You might also like to view...

The most common type of relationship between two tables is the ________ relationship

A) one-to-one B) one-to-many C) many-to-many D) referential integrity

Computer Science & Information Technology

The Start menu might display any of the following that enable you to make your choice EXCEPT:

A) text B) thumbnails C) small icons D) large icons

Computer Science & Information Technology