Joe, a user at a company, clicked an email link that led to a website that infected his workstation. Joe was connected to the network, and the virus spread to the network shares. The protective measures failed to stop this virus, and it has continued to evade detection. Which of the following should a security administrator implement to protect the environment from this malware?
DChilds
Highly Voted 1 year, 8 months agospearous
Most Recent 1 year, 1 month agoGeronemo
1 year, 2 months ago_invalid_nickname
1 year, 2 months agoganymede
1 year, 5 months agoComPCertOn
1 year, 7 months agoSoleandheel
1 year, 7 months agoRagingrnova_111
1 year, 6 months agoLinkinPark4evr
1 year, 9 months agosujon_london
1 year, 10 months agosujon_london
1 year, 10 months agozits88
1 year, 10 months agoCS3000
1 year, 10 months agorline63
1 year, 9 months agoiking
1 year, 9 months ago