Identify strategies to control and monitor the end-user policy violations and se
ID: 3713136 • Letter: I
Question
Identify strategies to control and monitor the end-user policy violations and security breaches listed below to mitigate risk and minimize exposure: " A user made unauthorized use of network resources by attacking network entities. -Open network drive shares allow storage privileges to outside users. - Sensitive laptop data is unencrypted and susceptible to physical theft. "Remote users do not have recent patches or current updates. * Legitimate traffic bearing a malicious payload exploits network services. An invalid protocol header disrupts a critical network service. " Removable storage drives introduce malware filtered only when crossing the network. Predictable passwords meet minimum length requirements but remain easily guessable. -Bad router permissions allow attackers to modify configurations or disrupt traffic.Explanation / Answer
Solution:
The points which will violate the end-user policies are listed below:
I hope this helps if you find any problem. Please comment below. Don't forget to give a thumbs up if you liked it. :)