What two other protection technologies can block and log such unauthorized application?

An organization created a rule in the Application and Device Control policy to block peer-to-peer applications.
What two other protection technologies can block and log such unauthorized application? (Choose two.)
A. Memory Exploit Mitigation
B. Virus and Spyware Protection
C. Custom IPS Signatures
D. Host Integrity
E. Firewall

Download Printable PDF. VALID exam to help you PASS.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.