Which of the following?

A minimal implementation of endpoint security includes which of the following?
A. Trusted platforms
B. Host-based firewalls
C. Token-based authentication
D. Wireless Access Points (AP)

Download Printable PDF. VALID exam to help you PASS.

One thought on “Which of the following?

  1. B

    See cbk 5th edition page 442, domain 4

    Endpoint security should at least consist of keeping a antivirus and anti-malware software current and using a host-based firewall correctly configured, a hardened configuration with unneeded services disabled, and a patched operating system

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.