8. Brad is a security manager and is preparing a presentation for his company's executives on the risks of using instant messaging (IM) and his reasons for wanting to prohibit its use on the company network. Which of the following should not be included in his presentation? a. Sensitive data and Files can be transferred from system to system over IM. b. Users can receive information-including malware-from an attacker posing as a legitimate sender. c. IM use can be stopped by simply blocking specific ports on the network firewalls. d. A security policy is needed specifying IM usage restrictions.
Find an answer to your question ✅ “8. Brad is a security manager and is preparing a presentation for his company's executives on the risks of using instant messaging (IM) and ...” in 📘 Computers and Technology if you're in doubt about the correctness of the answers or there's no answer, then try to use the smart search and find answers to the similar questions.
Home » Computers and Technology » 8. Brad is a security manager and is preparing a presentation for his company's executives on the risks of using instant messaging (IM) and his reasons for wanting to prohibit its use on the company network.