A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers. Which of the following actions should the IT security team implement to help protect the network from attack as a result of this new policy?

A. Install host-based anti-malware software
B. Implement MAC filtering on all wireless access points
C. Add an implicit deny to the core router ACL
D. Block port 80 outbound on the company firewall
E. Require users to utilize two-factor authentication

Answer: A. Install host-based anti-malware software

Computer Science & Information Technology

You might also like to view...

The____ in a story (for example, Alice or the White Rabbit) correspond to the objects we need to place in the Alice world.

A. adjectives B. verbs C. prepositions D. nouns

Computer Science & Information Technology

Briefly describe the concept of inodes used in native Linux file systems.

What will be an ideal response?

Computer Science & Information Technology