An organization has implemented a policy to detect and remove malicious software from its network.
Which of the following actions is focused on correcting rather than preventing attack?
A . Configuring a firewall to only allow communication to whitelisted hosts and ports
B . Using Network access control to disable communication by hosts with viruses
C . Disabling autorun features on all workstations on the network
D . Training users to recognize potential phishing attempts
Answer: B