Which of the following would be used to mitigate the risk of an unauthorized party authenticating into the network?
A.
Install a software-based firewall
B.
Establish a baseline and review logs daily
C.
Install antivirus software
D.
Disable the administrator account
C.