During a security audit, an organization discovered unauthorized programs on multiple workstations. Investigations revealed that employees had attached external hardware that contained malicious software. Which approach can best address this risk?
Enable endpoint encryption to secure each workstation.
Use an enterprise tool that requires administrators to authorize newly attached hardware.
Establish perimeter firewall settings that forward suspicious traffic for analysis.
Create a policy that enforces encryption for local disks.
Requiring administrators to authorize newly attached hardware prevents unexpected devices from being used. Endpoint encryption does not stop suspicious software from running, local disk encryption policies do not curb unauthorized attachments, and a perimeter firewall setting does not control local device usage. Restricting usage of removable media through an approval process directly tackles the root issue.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an enterprise tool that requires administrators to authorize hardware?
Open an interactive chat with Bash
How does endpoint encryption differ from device authorization in preventing threats?
Open an interactive chat with Bash
Why is a firewall not effective in controlling local device usage?