A.MIB B.FIB C.LDAP D.CEF
A.Configuration interceptor B.Network interceptor C.File system interceptor D.Execution space interceptor
A.Routinely apply patches to operating systems and applications B.Disable unneeded services and ports on hosts C.Deploy HIPS software on all end-user workstations D.Require strong passwords and enable password expiration