An end user’s host becomes infected with a virus because the end user browsed to a malicious website. Which endpoint security technology can be used to best prevent such an incident?
A. personal firewall
B. personal anti-virus
C. endpoint malware protection
D. file sandboxing
E. file integrity checks