A RAT that was used to compromise an organization’s banking credentials was found on a user’s computer. The RAT evaded antivirus detection. It was installed by a user who has local administrator rights to the system as part of a remote management tool set.
Which of the following recommendations would BEST prevent this from reoccurring?
A . Create a new acceptable use policy.
B . Segment the network into trusted and untrusted zones.
C . Enforce application whitelisting.
D . Implement DLP at the network boundary.
Answer: C