Which of the following is the MOST complete list of end-point security software the administrator could plan to implement?

Posted by: Pdfprep Category: CAS-001 Tags: , ,

After implementing port security, restricting all network traffic into and out of a network, migrating to IPv6, installing NIDS, firewalls, spam and application filters, a security administer is convinced that the network is secure. The administrator now focuses on securing the hosts on the network, starting with the servers.

Which of the following is the MOST complete list of end-point security software the administrator could plan to implement?
A . Anti-malware/virus/spyware/spam software, as well as a host based firewall and strong, two-factor authentication.
B . Anti-virus/spyware/spam software, as well as a host based IDS, firewall, and strong three-factor authentication.
C . Anti-malware/virus/spyware/spam software, as well as a host based firewall and biometric authentication.
D . Anti-malware/spam software, as well as a host based firewall and strong, three-factor authentication.

Answer: A

Leave a Reply

Your email address will not be published.