Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?
A. Verify that the company IPS blocks all known malicious websites.
B. Implement URL filtering on the perimeter firewall.
C. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores.
D. Verify that antivirus software is installed and up to date for all users on your network.
C – is incorrect because low reputation scores are less likely to be a threat. The answer is B.