Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?

Posted by: Pdfprep Category: 210-260 Tags: , ,

Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?
A . Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores.
B . Verify that the company IPS blocks all known malicious websites.
C . Verify that antivirus software is installed and up to date for all users on your network.
D . Implement URL filtering on the perimeter firewall.

Answer: A

Leave a Reply

Your email address will not be published.