A remote user has a laptop computer and wants to connect to a wireless network in a hotel. Which
of the following should be implemented to protect the laptop computer when connecting to the
hotel network?
A.
Personal firewall
B.
Network firewall
C.
Privacy screen
D.
Router with firewall rule set