Which security rule should be implemented to minimize risk of malware infection of endpoint systems?

A. Configure a software firewall.
B. Disable the use of USB storage devices.
C. Encrypt all file storage.
D. Audit user activity.

Answer: B. Disable the use of USB storage devices.

Computer Science & Information Technology

You might also like to view...

Many effects in Illustrator are actually ____.

A. plug-ins B. illusions C. impossible D. fake

Computer Science & Information Technology

Caching is a strategy to use when you want to exclude a particular file from being uploaded to a server.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology