A technician needs to install software onto company laptops to protect local running services, from external threats. Which of the following should the technician install and configure on the laptops if the threat is network based?

A. A cloud-based antivirus system with a heuristic and signature based engine
B. A network based firewall which blocks all inbound communication
C. A host-based firewall which allows all outbound communication
D. A HIDS to inspect both inbound and outbound network communication

Answer: C. A host-based firewall which allows all outbound communication

Computer Science & Information Technology

You might also like to view...

After the completion processing of the program to update a sequential file,

a. The old master file is the same as the new master file. b. The backup file is the same as the new master file. c. The old master file is the same as the backup file. d. None of the above.

Computer Science & Information Technology

Which of the following can be used to make a forensic copy of a drive?

A) Access Data FTK B) Guidance Software En Case C) Linux dd command D) All of the above

Computer Science & Information Technology