Your network uses a standard image with a HIDS and anti-malware software for all computers. The network recently suffered some malware attacks, and the CIO has tasked you with determining how to keep the attacks from reoccurring. Which of the following items should you do first?
A. erform vulnerability assessment of the standard image, and remediate findings.
B. Install a HIPS on all systems.
C. Install a NIDS.
D. Deploy a NIPS.
A
Explanation: Not only is this the least costly option to start with, it makes sense to check the image first.
Computer Science & Information Technology
You might also like to view...
________ is a category of programs that are intended to do harm to your computer
A) Malware B) Spyware C) Virus protection D) Adware
Computer Science & Information Technology
This collaborative support group began as a cooperative effort between the FBI's Cleveland field office and local technology professionals with a focus of protecting critical national infrastructure.
A. InfraGard B. Homeland Security C. CyberWatch D. CyberGard
Computer Science & Information Technology