Which of the following should be implemented to secure the devices without risking availability?

A company has proprietary mission critical devices connected to their network which are
configured remotely by both employees and approved customers. The administrator wants to
monitor device security without changing their baseline configuration. Which of the following
should be implemented to secure the devices without risking availability?

A company has proprietary mission critical devices connected to their network which are
configured remotely by both employees and approved customers. The administrator wants to
monitor device security without changing their baseline configuration. Which of the following
should be implemented to secure the devices without risking availability?

A.
Host-based firewall

B.
IDS

C.
IPS

D.
Honeypot

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *