Which of the following BEST addresses these requirements if the environment is concurrently shared by multiple users?
Which of the following should a company implement to BEST mitigate from zero-day malicious code executing on employees’ computers?