A hospital in another county just received a new variant of ransom ware that infected 70% of its systems. After learning the characteristics of this ransom ware, the security team wants to implement a protection policy to stop certain files from being modified and new registry keys from being created that are relevant to the ransom ware. Which of the following policies meets this requirement?
- Exploit prevention policy
- Block and allow list policy
- Access protection policy
- Firewall rules policy
Reveal Solution
Next Question