Ann, a web developer, reports performance issues with her laptop and is not able to access any network resources. After further investigation, a bootkit was discovered and it was trying to access external websites. Which of the following hardening techniques should be applied to mitigate this specific issue from reoccurring?

Posted by: Pdfprep Category: CAS-002 Tags: , ,

Company policy requires that all company laptops meet the following baseline requirements:

Software requirements:

Antivirus

Anti-malware

Anti-spyware

Log monitoring

Full-disk encryption

Terminal services enabled for RDP

Administrative access for local users

Hardware restrictions:

Bluetooth disabled

FireWire disabled

WiFi adapter disabled

Ann, a web developer, reports performance issues with her laptop and is not able to access any network resources. After further investigation, a bootkit was discovered and it was trying to access external websites. Which of the following hardening techniques should be applied to mitigate this specific issue from reoccurring? (Select TWO).
A . Group policy to limit web access
B . Restrict VPN access for all mobile users
C . Remove full-disk encryption
D . Remove administrative access to local users
E . Restrict/disable TELNET access to network resources
F . Perform vulnerability scanning on a daily basis
G . Restrict/disable USB access

Answer: D, G

Leave a Reply

Your email address will not be published.