A business has recently deployed laptops to all sales employees. The laptops will be used primarily from home offices and while traveling, and a high amount of wireless mobile use is expected.To protect the laptops while connected to untrusted wireless networks, which of the following would be the BEST method for reducing the risk of having the laptops compromised?
A. MAC filtering
B. Virtualization
C. OS hardening
D. Application white-listing
Answer: C. OS hardening
You might also like to view...
Consider distributed optimistic concurrency control in which each server performs local backward validation sequentially (that is, with only one transaction in the validate and update phase at one time), in relation to your answer to Exercise 17.4. Describe the possible outcomes when the two transactions attempt to commit. What difference does it make if the servers use parallel validation?
What will be an ideal response?
You perform a network ____________ to move virtual machine files from one host to another.
Fill in the blank(s) with the appropriate word(s).
Shape modes are found on the ____________________ panel.
Fill in the blank(s) with the appropriate word(s).
Scanners produce images through either impact or nonimpact technologies. _________________________
Answer the following statement true (T) or false (F)