An organization has created a policy that allows software from an approved list of applications to be installed on workstations. Programs not on the list should not be installed. How can the organization best monitor compliance with the policy?
Hmm, I'm a bit unsure on this one. I'll need to re-read the question and the answer choices carefully to make sure I understand the "data minimization" principle correctly.
Hmm, I'm a bit confused here. The question mentions a CIFS share, so I'm not sure if Kerberos would be the right thing to look at. Maybe I should focus more on the data LIF and the node it's on.
Okay, I think I've got this. I'll use the `trivy image` command to scan the two images, filter for high and critical severities, and redirect the output to the specified file. Should be a pretty straightforward task.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Rosann
4 months agoRonny
4 months agoTamala
4 months agoReyes
4 months agoAlethea
5 months agoZena
5 months agoTabetha
5 months agoArminda
5 months agoLaurel
5 months agoNoel
5 months agoMaynard
5 months agoTracie
5 months ago