Company policy requires that all company laptops meet the following baseline requirements:
Software requirements:
Antivirus
Anti-malware
Anti-spyware
Log monitoring
Full-disk encryption
Terminal services enabled for RDP
Administrative access for local users
Hardware restrictions:
Bluetooth disabled
FireWire disabled
WiFi adapter disabled
Ann, a web developer, reports performance issues with her laptop and is not able to access any network resources. After further investigation, a bootkit was discovered and it was trying to access external websites. Which of the following hardening techniques should be applied to mitigate this specific issue from reoccurring? (Select TWO).
A . Group policy to limit web access
B . Restrict VPN access for all mobile users
C . Remove full-disk encryption
D . Remove administrative access to local users
E . Restrict/disable TELNET access to network resources
F . Perform vulnerability scanning on a daily basis
G . Restrict/disable USB access
Answer: D, G