Users are utilizing thumb drives to connect to USB ports on company workstations. A technician is concerned
that sensitive files can be copied to the USB drives. Which of the following mitigation techniques would address
this concern? (Choose two.)
Disable the USB root hub within the OS.
Install anti-virus software on the USB drives.
Disable USB within the workstations BIOS.
Apply the concept of least privilege to USB devices.
Run spyware detection against all workstations.
A: The USB root hub can be disabled from within the operating system.
C: USB can also be configured and disabled in the system BIOS.