Which security rule should be implemented to minimize risk of malware infection of endpoint systems?
A. Configure a software firewall.
B. Disable the use of USB storage devices.
C. Encrypt all file storage.
D. Audit user activity.
Answer: B. Disable the use of USB storage devices.
Computer Science & Information Technology
You might also like to view...
Many effects in Illustrator are actually ____.
A. plug-ins B. illusions C. impossible D. fake
Computer Science & Information Technology
Caching is a strategy to use when you want to exclude a particular file from being uploaded to a server.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology