Question: As security professionals, we rely on various tools allowing our users to accomplish a fundamental task: their secure access to a TCP / IP network.

As security professionals, we rely on various tools allowing our users to accomplish a fundamental task: their secure access to a TCP/IP network. We do this using various tools:
Anti-malware programs
File integrity checks
Data loss prevention
Application whitelisting
Application blacklisting
Firewalls
Intrusion detection
In looking at the above list, rank order the seven tools and explain your reasoning for your ranking. What additional tools would you include on this list and why?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!