The incidence of rogue phones gaining network access has dropped to zero. Which security solution has most likely been deployed?
A.
Implementing approved anti-virus software
B.
Applying O/S patches regularly and often
C.
Deploying a well-configured firewall
D.
Requiring signed firmware loads
E.
Requiring password logins for phone usage
F.
Deploying secure RTP