A business has recently deployed laptops to all sales employees. The laptops will be used primarily from home
offices and while traveling, and a high amount of wireless mobile use is expected. To protect the laptops while
connected to untrusted wireless networks, which of the following would be the BEST method for reducing the
risk of having the laptops compromised?
A.
MAC filtering
B.
Virtualization
C.
OS hardening
D.
Application white-listing