Which of the following is the BEST way to verify that all critical production servers are utilizing upto- date virus signature files?
Which of the following actions should be taken when an information security manager discovers that a hacker is foot printing the network perimeter?