Ask Question
14 January, 03:48

8. Brad is a security manager and is preparing a presentation for his company's executives on the risks of using instant messaging (IM) and his reasons for wanting to prohibit its use on the company network. Which of the following should not be included in his presentation? a. Sensitive data and Files can be transferred from system to system over IM. b. Users can receive information-including malware-from an attacker posing as a legitimate sender. c. IM use can be stopped by simply blocking specific ports on the network firewalls. d. A security policy is needed specifying IM usage restrictions.

+3
Answers (1)
  1. 14 January, 04:35
    0
    Letter c is correct. IM use can be stopped by simply blocking specific ports on the network firewalls.

    Explanation:

    The letter c is the alternative that should not be included in Brad's presentation to executives at his company about the risks of using instant messaging (IM).

    This alternative refers only to the existing way to stop the use of instant messaging by blocking specific ports on network firewalls, and does not offer a reason why the use should be prohibited in the company, unlike other alternatives, which present the risks inherent in use of instant messaging in the company, and would therefore be more plausible reasons for executives to consider.
Know the Answer?
Not Sure About the Answer?
Get an answer to your question ✅ “8. Brad is a security manager and is preparing a presentation for his company's executives on the risks of using instant messaging (IM) and ...” in 📙 Computers & Technology if there is no answer or all answers are wrong, use a search bar and try to find the answer among similar questions.
Search for Other Answers