CompTIA Exam Questions

Which of the following hardening techniques should be a…

Company policy requires that all company laptops meet the following baseline requirements:
Software requirements:
Antivirus Anti-malware Anti-spyware
Log monitoring
Full-disk encryption
Terminal services enabled for RDP Administrative access for local users Hardware restrictions: Bluetooth
disabled FireWire disabled WiFi adapter disabled Ann, a web developer, reports performance issues with her
laptop and is not able to access any network resources. After further investigation, a bootkit was discovered
and it was trying to access external websites. Which of the following hardening techniques should be applied to
mitigate this specific issue from reoccurring? (Select TWO).

A.
Group policy to limit web access

B.
Restrict VPN access for all mobile users

C.
Remove full-disk encryption

D.
Remove administrative access to local users

E.
Restrict/disable TELNET access to network resources

F.
Perform vulnerability scanning on a daily basis

G.
Restrict/disable USB access