Lab 10
Lab 10
Hacker penetrates your IT Deploy intrusion detection and prevention systems (IDPS)
infrastructure and gains access to and conduct regular security audits. Implement least
your internal network privilege access controls.
Service provider has a major Establish backup internet service providers (ISPs) and
network outage failover mechanisms to maintain business continuity.
User inserts CDs and USB hard Implement device control policies to block unauthorized
drives with personal photos, USB and external media usage. Require encryption for
music, and videos approved removable devices.
WLAN access points are needed Secure WLAN access points with WPA3 encryption and
for LAN connectivity within a implement MAC address filtering. Regularly monitor and
warehouse audit access logs.