A company creates free web access computers for use in public areas, such as airports. The software provided on the computers will be static and the systems must be secure. What should be used to restrict unauthorized applications from running on these computers?
A. client security settings and Tamper Protection
B. blocked devices in an Application and Device Control policy
C. file fingerprint list and System Lockdown
D. custom IPS signatures in an Intrusion Prevention policy