During a company-wide initiative to harden network security, it is discovered that end users who have laptops cannot be removed from the local administrator group. Which of the following could be used to help mitigate the risk of these machines becoming compromised?

A. Security log auditing
B. Firewalls
C. HIPS
D. IDS


Answer: B. Firewalls

Computer Science & Information Technology

You might also like to view...

Which data structure represents a waiting line and limits insertions to be made at the back of the data structure and limits removals to be made from the front?

a. Stack. b. Queue. c. Binary tree. d. Linked list.

Computer Science & Information Technology

When parentheses in an arithmetic expression are nested, the __________ set of parentheses is evaluated first.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

How can you force a paragraph to start at the top of the next column?

What will be an ideal response?

Computer Science & Information Technology

If you want to configure settings for all users in the same Organizational Unit (OU), the best tool to use is the __. Policy changes in __ affect all users in the OU.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology