subject

You are tasked with securing a small network for a client in which the following requirements must be met: If a user on the private network attempts to send confidential company information to an unauthorized entity, an alert should be triggered.
The private trusted network should not be accessible from the public untrusted network. If attacks are coming from the external network, the system should detect and prevent malicious activity. All incoming and out going email should be scanned for malware. Which of the following would best meet the requirements?

(A) Implement a firewall.
(B) Implement a IPS
(C) Implement a UTM appliance.
(D) Implement identity -based ACLS
(E) Implement IDS

ansver
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 04:30, safi30360oz0c34
What kind of software users of all skill levels create web pages that include graphics, video, audio, animation, and other special effects? website authoring website software website publishing website editing
Answers: 1
image
Computers and Technology, 22.06.2019 15:00, vladutraileanu7599
Which of the following has not been attributed at least in part to social media a. drug addiction b. depression c. kidnapping d. murder
Answers: 2
image
Computers and Technology, 23.06.2019 09:00, opgbadwolf5
What provides an array of buttons for quick access to commonly used commands and tools
Answers: 1
image
Computers and Technology, 23.06.2019 10:30, badpotterchris
How would you categorize the software that runs on mobile devices? break down these apps into at least three basic categories and give an example of each.
Answers: 1
You know the right answer?
You are tasked with securing a small network for a client in which the following requirements must b...

Questions in other subjects:

Konu
Business, 24.01.2022 23:30
Konu
Mathematics, 24.01.2022 23:30
Konu
Mathematics, 24.01.2022 23:30