A business has recently deployed laptops to all sales employees.
The laptops will be used primarily from home offices and while traveling, and a high amount of wireless mobile use is expected.
To protect the laptops while connected to untrusted wireless networks, which of the following would be the BEST method for reducing the risk of having the laptops compromised?
Click on the arrows to vote for the correct answer
A. B. C. D.C.
The BEST method for reducing the risk of having the laptops compromised while connected to untrusted wireless networks is to implement OS hardening.
OS hardening is the process of securing an operating system by reducing its attack surface. This can be achieved by disabling unnecessary services and protocols, removing unnecessary applications, and applying security patches and updates.
In the case of laptops used by sales employees, OS hardening would involve implementing measures such as:
MAC filtering, virtualization, and application white-listing are also security measures, but they are not as effective as OS hardening in reducing the risk of having the laptops compromised while connected to untrusted wireless networks.
MAC filtering is a security measure that restricts access to a network by only allowing devices with approved MAC addresses to connect. However, MAC addresses can be spoofed, and MAC filtering alone does not provide sufficient security.
Virtualization involves running multiple operating systems on a single physical machine. While virtualization can provide some security benefits, it is not a primary security measure for protecting laptops connected to untrusted wireless networks.
Application white-listing is a security measure that allows only approved applications to run on a system. While it can be effective in preventing malware infections, it is not the best method for reducing the risk of having laptops compromised while connected to untrusted wireless networks.