Which of the following is an important step in the initial stages of deploying a host-based firewall?
A.
Selecting identification versus authentication
B.
Determining the list of exceptions
C.
Choosing an encryption algorithm
D.
Setting time of day restrictions