PdfPrep.com

Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?

Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?
A . Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores.
B . Verify that the company IPS blocks all known malicious websites.
C . Verify that antivirus software is installed and up to date for all users on your network.
D . Implement URL filtering on the perimeter firewall.

Answer: A

Exit mobile version