as the security analyst for your organization, you have noticed an increase in user computers being infected with malware. which two solutions should you implement and configure to remedy this problem? (select two.)