News outlets are beginning to report on a number of retail establishments that are experiencing payment card
data breaches. The data exfiltration is enabled by malware on a compromised computer. After the initial exploit,
network mapping and fingerprinting is conducted to prepare for further exploitation. Which of the following is the
MOST effective solution to protect against unrecognized malware infections?
A.
Remove local admin permissions from all users and change anti-virus to a cloud aware, push technology.
B.
Implement an application whitelist at all levels of the organization.
C.
Deploy a network based heuristic IDS, configure all layer 3 switches to feed data to the IDS for more
effective monitoring.
D.
Update router configuration to pass all network traffic through a new proxy server with advanced malware
detection.