subject

An organization has several production-critical scada supervisory systems that cannot follow the normal 30- day patching policy. which of the following best maximizes the protection of these systems from malicious software? a. configure a firewall with deep packet inspection that restricts traffic to the systems. b. configure a separate zone for the systems and restrict access to known ports. c. configure the systems to ensure only necessary applications are able to run. d. configure the host firewall to ensure only the necessary applications have listening ports

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 10:00
Businesses allocate resources for their best and most productive uses. the more a resource, the more costly it will be. a manufacturer that requires scarce and costly resources is likely to charge for its products.
Answers: 2
question
Computers and Technology, 24.06.2019 04:30
What is the process in which the software development team compiles information to determine the final product
Answers: 1
question
Computers and Technology, 24.06.2019 22:30
The a great imaginary circle, or reference line, around earth that is equally distant from the two poles and divides earth into the northern and southern hemispheres.
Answers: 1
question
Computers and Technology, 25.06.2019 00:00
Into which of these files would you paste copied information to create an integrated document? a. mailing list b. destination c. source d. data source
Answers: 1
You know the right answer?
An organization has several production-critical scada supervisory systems that cannot follow the nor...
Questions
question
Mathematics, 29.03.2020 18:55
question
Mathematics, 29.03.2020 18:56
question
Mathematics, 29.03.2020 18:56
Questions on the website: 13722361