subject

You find out that the attackers were able to gain access to the workstations because of the legacy operating system being used. the organization still needs to use the windows 2000 workstations—which need to be connected to the internet—but you want to make sure the network is protected from future events. which solution should you implement to protect the network while also allowing operations to continue as normal? a. configure vlan membership so that the windows 2000 workstations are on their own vlan. b. install anti-virus software on the windows 2000 workstations and configure windows to automatically download and install updates. c. create a dedicated network for the windows 2000 workstations that is completely isolated from the rest of the network, including a separate internet connection. d. implement a host-based firewall on each windows 2000 workstation and configure windows to automatically download and install updates.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 13:30
In which phase does software coding and testing happen in the spiral model? the spiral model does not have a separate testing phase. both, software coding and testing occurs during the phase.
Answers: 3
question
Computers and Technology, 23.06.2019 11:00
What are the possible consequences of computer hacking? what is computer piracy? describe some examples. what are the effects of computer piracy? what are the possible consequences of computer piracy? what is intentional virus setting? describe some examples. what are the effects of intentional virus setting? what are the possible consequences of intentional virus setting? what is invasion of privacy? describe some examples. what are the effects of invasion of privacy? what are the possible consequences of invasion of privacy? what is an acceptable use policy and what is the purpose of the acceptable use policy what is intellectual property and how can you use it?
Answers: 1
question
Computers and Technology, 24.06.2019 00:50
Which player type acts on other players? a. killer b. achiever c. explorer d. socializer
Answers: 1
question
Computers and Technology, 24.06.2019 02:20
The first time a user launches the powerpoint program, which view is shown allowing the user to access recent presentations or create new presentations based on templates?
Answers: 1
You know the right answer?
You find out that the attackers were able to gain access to the workstations because of the legacy o...
Questions
question
Mathematics, 24.01.2020 20:31
question
Mathematics, 24.01.2020 20:31
question
Health, 24.01.2020 20:31
question
Mathematics, 24.01.2020 20:31
Questions on the website: 13722362