Which of the following technologies will enforce protec…

A government agency wants to ensure that the systems they use have been deployed as security as possible. Which of the following technologies will enforce
protections on these systems to prevent files and services from operating outside of a strict rule set?

A government agency wants to ensure that the systems they use have been deployed as security as possible. Which of the following technologies will enforce
protections on these systems to prevent files and services from operating outside of a strict rule set?

A.
Host based Intrusion detection

B.
Host-based firewall

C.
Trusted OS

D.
Antivirus



Leave a Reply 0

Your email address will not be published. Required fields are marked *

9 + 8 =