An incident response report indicates a virus was introduced through a remote host that was connected to corporate resources. A cybersecurity analyst has been asked for a recommendation to solve this issue. Which of the following should be applied?
A.
MAC
B.
TAP
C.
NAC
D.
ACL
Explanation: