How can you protect an organization from pivoting attacks? (Choose four.)
A. use the personal firewall on all the hosts to prevent any outbound access
B. monitor the network closely observe the logs and follow up on anything that looks suspicious
C. keep software updates and security patches current
D. limit user accounts to minimal privileges
E. limit the ability of user machines to interact with each other