A business has recently deployed laptops to all sales employees. The laptops will be used primarily from home offices and while traveling, and a high amount of wireless mobile use is expected.To protect the laptops while connected to untrusted wireless networks, which of the following would be the BEST method for reducing the risk of having the laptops compromised?

A. MAC filtering
B. Virtualization
C. OS hardening
D. Application white-listing


Answer: C. OS hardening

Computer Science & Information Technology

You might also like to view...

Consider distributed optimistic concurrency control in which each server performs local backward validation sequentially (that is, with only one transaction in the validate and update phase at one time), in relation to your answer to Exercise 17.4. Describe the possible outcomes when the two transactions attempt to commit. What difference does it make if the servers use parallel validation?

What will be an ideal response?

Computer Science & Information Technology

You perform a network ____________ to move virtual machine files from one host to another.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Shape modes are found on the ____________________ panel.     

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Scanners produce images through either impact or nonimpact technologies. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology