Users are utilizing thumb drives to connect to USB ports on company workstations. A technician is concerned that sensitive files can be copied to the USB drives. Which of the following mitigation techniques would address this concern? (Select TWO).
A.
Disable the USB root hub within the OS.
B.
Install anti-virus software on the USB drives.
C.
Disable USB within the workstations BIOS.
D.
Apply the concept of least privilege to USB devices.
E.
Run spyware detection against all workstations.