Which of the following should a company implement to BEST mitigate from zero-day malicious
code executing on employees’ computers?
A.
Least privilege accounts
B.
Host-based firewalls
C.
Intrusion Detection Systems
D.
Application white listing
Which of the following should a company implement to BEST mitigate from zero-day malicious
code executing on employees’ computers?
Which of the following should a company implement to BEST mitigate from zero-day malicious
code executing on employees’ computers?
A.
Least privilege accounts
B.
Host-based firewalls
C.
Intrusion Detection Systems
D.
Application white listing