Company policy requires that all company laptops meet the following baseline requirements:
Software requirements:
Antivirus
Anti-malware
Anti-spyware
Log monitoring
Full-disk encryption
Terminal services enabled for RDP
Administrative access for local users
Hardware restrictions:
Bluetooth disabled
FireWire disabled
WiFi adapter disabled
Ann, a web developer, reports performance issues with her laptop and is not able to access any network
resources. After further investigation, a bootkit was discovered and it was trying to access external websites.
Which of the following hardening techniques should be applied to mitigate this specific issue from reoccurring?
(Select TWO).
A.
Group policy to limit web access
B.
Restrict VPN access for all mobile users
C.
Remove full-disk encryption
D.
Remove administrative access to local users
E.
Restrict/disable TELNET access to network resources
F.
Perform vulnerability scanning on a daily basis
G.
Restrict/disable USB access