An incident response report indicates a virus was introduced through a remote host that was connected to corporate resources. A cybersecurity analyst has been asked for a recommendation to solve this issue.
Which of the following should be applied?
A . MAC
B . TAP
C . NAC
D . ACL
Answer: C