A security administrator wants to deploy security controls to mitigate the threat of company
employees’ personal information being captured online. Which of the following would BEST serve
this purpose?
A.
Anti-spyware
B.
Antivirus
C.
Host-based firewall
D.
Web content filter
Explanation:
Spyware monitors a user’s activity and uses network protocols to reports it to a third party without
the user’s knowledge. This is usually accomplished using a tracking cookie.