A government agency wants to ensure that the systems they use have been deployed as security as possible.
Which of the following technologies will enforce protections on these systems to prevent files and services from
operating outside of a strict rule set?
A.
Host-based Intrusion detection
B.
Host-based firewall
C.
Trusted OS
D.
Antivirus