Joe, a technician, is working remotely with his company provided laptop at the coffee shop near his home.
Joe is concerned that another patron of the coffee shop may be trying to access his laptop.
Which of the following is an appropriate control to use to prevent the other patron from accessing Joe's laptop directly?
Click on the arrows to vote for the correct answer
A. B. C. D.B.
The appropriate control to use to prevent the other patron from accessing Joe's laptop directly in this scenario would be a host-based firewall.
Explanation:
A host-based firewall is a type of firewall that is installed on individual hosts or endpoints, such as laptops or desktops. It can control the incoming and outgoing network traffic of the host, filtering and blocking unauthorized connections.
In this scenario, Joe is using his company provided laptop at a public place, which increases the risk of unauthorized access to his laptop. By enabling a host-based firewall on his laptop, Joe can prevent unauthorized access to his laptop by blocking incoming connections from other devices at the coffee shop.
While full-disk encryption, current antivirus definitions, and the latest OS updates are important security measures, they are not appropriate controls to prevent direct access to Joe's laptop. Full-disk encryption protects the data on the disk in case of loss or theft, but it does not prevent unauthorized access to the laptop. Current antivirus definitions and the latest OS updates are important to protect against malware, but they do not prevent unauthorized access to the laptop.
Therefore, the most appropriate control to use in this scenario to prevent the other patron from accessing Joe's laptop directly is a host-based firewall.