News outlets are beginning to report on a number of retail establishments that are experiencing
payment card data breaches. The data exfiltration is enabled by malware on a compromised
computer. After the initial exploit network mapping and fingerprinting occurs in preparation for
further exploitation. Which of the following is the MOST effective solution to protect against
unrecognized malware infections, reduce detection time, and minimize any damage that might be
done?
A.
Remove local admin permissions from all users and change anti-virus to a cloud aware, push
technology.
B.
Implement an application whitelist at all levels of the organization.
C.
Deploy a network based heuristic IDS, configure all layer 3 switches to feed data to the IDS for
more effective monitoring.
D.
Update router configuration to pass all network traffic through a new proxy server with
advanced malware detection.