A security administrator wants to implement a system that will allow the organization to quickly and securely recover from a computer breach. The security
administrator notices that the majority of malware infections are caused by zero-day armored viruses and rootkits. Which of the following solutions should the
system administrator implement?
A.
Install an antivirus solution that provides HIPS capabilities.
B.
Implement a thick-client model with local snapshots.
C.
Deploy an enterprise patch management system.
D.
Enable the host-based firewall and remove users’ administrative rights.