Once an attacker gains remote control access over a system, they want to retain this illicit access. Some attackers will block the system update service to prevent new updates from fixing vulnerabilities that are needed to maintain remote control over the compromised system. To prevent such a compromised system from allowing the attacker to access resources on the network, what security mechanism should be implemented?

A. Network access control
B. A Web security gateway
C. Complex password authentication
D. Intrusion detection system

Answer: A. Network access control

Computer Science & Information Technology

You might also like to view...

What cannot be created by using the mail merge feature in Access or Word?

A) Access table B) Labels C) Letters D) Envelopes

Computer Science & Information Technology

The value for the target attribute that will cause a link to open in a new window is ________

Fill in the blank(s) with correct word

Computer Science & Information Technology