8. Brad is a security manager and is preparing a presentation for his company's executives on the risks of using instant messaging (IM) and his reasons for wanting to prohibit its use on the company network. Which of the following should not be included in his presentation? a. Sensitive data and Files can be transferred from system to system over IM. b. Users can receive information-including malware-from an attacker posing as a legitimate sender. c. IM use can be stopped by simply blocking specific ports on the network firewalls. d. A security policy is needed specifying IM usage restrictions.
+1
Answers (1)
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “8. Brad is a security manager and is preparing a presentation for his company's executives on the risks of using instant messaging (IM) and ...” in 📗 Computers & Technology if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Home » Computers & Technology » 8. Brad is a security manager and is preparing a presentation for his company's executives on the risks of using instant messaging (IM) and his reasons for wanting to prohibit its use on the company network.