Which of the following is the MOST complete list of end-point security software the administrator could plan to implement?

After implementing port security, restricting all network traffic into and out of a network, migrating
to IPv6, installing NIDS, firewalls, spam and application filters, a security administer is convinced
that the network is secure. The administrator now focuses on securing the hosts on the network,
starting with the servers.
Which of the following is the MOST complete list of end-point security software the administrator
could plan to implement?

After implementing port security, restricting all network traffic into and out of a network, migrating
to IPv6, installing NIDS, firewalls, spam and application filters, a security administer is convinced
that the network is secure. The administrator now focuses on securing the hosts on the network,
starting with the servers.
Which of the following is the MOST complete list of end-point security software the administrator
could plan to implement?

A.
Anti-malware/virus/spyware/spam software, as well as a host based firewall and strong, twofactor authentication.

B.
Anti-virus/spyware/spam software, as well as a host based IDS, firewall, and strong three-factor
authentication.

C.
Anti-malware/virus/spyware/spam software, as well as a host based firewall and biometric
authentication.

D.
Anti-malware/spam software, as well as a host based firewall and strong, three-factor
authentication.



Leave a Reply 0

Your email address will not be published. Required fields are marked *