A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers. Which of the following actions should the IT security team implement to help protect the network from attack as a result of this new policy?
A. Install host-based anti-malware software
B. Implement MAC filtering on all wireless access points
C. Add an implicit deny to the core router ACL
D. Block port 80 outbound on the company firewall
E. Require users to utilize two-factor authentication
Answer: A. Install host-based anti-malware software
Computer Science & Information Technology
You might also like to view...
The____ in a story (for example, Alice or the White Rabbit) correspond to the objects we need to place in the Alice world.
A. adjectives B. verbs C. prepositions D. nouns
Computer Science & Information Technology
Briefly describe the concept of inodes used in native Linux file systems.
What will be an ideal response?
Computer Science & Information Technology