Which of the following could be used to help mitigate the risk of these machines becoming compromised?

During a company-wide initiative to harden network security, it is discovered that end users who have
laptops cannot be removed from the local administrator group. Which of the following could be used to
help mitigate the risk of these machines becoming compromised?

During a company-wide initiative to harden network security, it is discovered that end users who have
laptops cannot be removed from the local administrator group. Which of the following could be used to
help mitigate the risk of these machines becoming compromised?

A.
Security log auditing

B.
Firewalls

C.
HIPS

D.
IDS



Leave a Reply 0

Your email address will not be published. Required fields are marked *

nine − 1 =