A business has recently deployed laptops to all sales employees. The laptops will be used primarily from
home offices and while traveling, and a high amount of wireless mobile use is expected. To protect the
laptops while connected to untrusted wireless networks, which of the following would be the BEST
method for reducing the risk of having the laptops compromised?

A.
MAC filtering
B.
Virtualization
C.
OS hardening
D.
Application white-listing