A security administrator is performing a gap assessment against a specific OS benchmark. The benchmark requires the following configurations be applied to endpoints:
• Full disk encryption
• Host-based firewall
• Time synchronization
• Password policies
• Application allow listing
• Zero Trust application access
Which of the following solutions best addresses the requirements? (Choose two.)
rvv1978
4 months agoJimwade1985
4 months, 1 week agoIandyxtran
4 months, 3 weeks agomartin451
5 months agoIandyxtran
4 months, 3 weeks ago