Which of the following sits inline with network traffic and helps prevent malicious behavior as it occurs by either
dropping packets or correcting TCP stream related issues?
An administrator is concerned about the amount of time it would take to investigate email that may be subject to
inspection during legal proceedings. Which of the following could help limit the company's exposure and the
time spent on these types of proceedings?
A user reports that they opened an attachment from an email received through a distribution list. At a later date,
several computers started behaving abnormally. Which of the following threats has MOST likely infected the
computer?
An administrator believes a user has more access to a financial application than they should. Which of the
following policies would this MOST likely violate?