Does anyone know the answer to the following question:
A technician is performing a company-wide upgrade of a document reader application. A user is trying to launch the new application by the name of: DOC-VIEWERv2.EXE. When the application fails to launch, the user opens a help desk ticket. The technician reviews the following application list:
Which of the following should the technician implement while maintaining the current security posture, given that the company-wide deployment of the new application is not complete?
- Add the new application to the top of the whitelist.
- Rename the executable on all computers to DOC-VIEWER.EXE
- Replace the name of the application in LINE 2 with DOC-VIEWERv2.EXE
- Temporarily change the DENY in LINE 5 with PERMIT
A company has classified the following database records.