A security administrator is performing a gap assessment against a specific OS benchmark. The benchmark requires the following configurations be applied to endpoints:
• Full disk encryption
• Host-based firewall
• Time synchronization
• Password policies
• Application allow listing
• Zero Trust application access
Which of the following solutions best addresses the requirements? (Choose two.)
rvv1978
5 months, 3 weeks agoJimwade1985
6 months agoIandyxtran
6 months, 2 weeks agomartin451
6 months, 3 weeks agoIandyxtran
6 months, 2 weeks ago