110k views
2 votes
A threat advisory alert was just emailed to the IT security staff. The alert references specific types of host operating systems that can allow an unauthorized person to access files on a system remotely. A fix was recently published, but it requires a recent endpoint protection engine to be installed prior to running the fix.

Which of the following MOST likely need to be configured to ensure the system are mitigated accordingly?

A. Antivirus
B. HIPS
C. Application whitelisting
D. Patch management
E. Group policy implementation
F. Firmware updates

User Aktar
by
8.1k points

1 Answer

2 votes

Final answer:

Implementing antivirus software, patch management, and application whitelisting are the recommended measures to mitigate the security risks mentioned in the question.

Step-by-step explanation:

The types of host operating systems that can allow an unauthorized person to access files on a system remotely are typically vulnerable to security breaches. Implementing antivirus software, patch management, and application whitelisting are the recommended measures to mitigate the security risks mentioned in the question. In this scenario, the system needs to be mitigated.

The best way to achieve this is by implementing antivirus software, which can detect and remove malware that may compromise the system's security. Additionally, patch management is crucial to ensure that the latest security patches and updates are installed, which can fix any vulnerabilities in the operating system. Lastly, application whitelisting can be effective in preventing unauthorized access by allowing only trusted applications to run on the system.

User Gaucho
by
7.8k points