A. Installing a firewall to identify malicious traffic
B. Rerouting suspicious communications to a remote machine
C. Implementing a two-factor authentication system
D. Installing endpoint protection software
Explanation:
The correct answer is D ― Installing endpoint protection software.
WGU Cybersecurity Architecture and Engineering (KFO1 / D488) teaches that endpoint protection (including antivirus, anti-malware, and endpoint detection and response) is critical for detecting, blocking, and removing commodity malware like ransomware and Trojans.
Firewalls (A) help with perimeter security but don't directly block malware on endpoints. Rerouting communications (B) is not a standard protection method. Two-factor authentication (C) secures logins but does not protect systems from malware infection.
Reference Extract from Study Guide:
"Endpoint protection software defends individual systems against malware threats by detecting, blocking, and removing malicious files and processes."
― WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Endpoint Security Solutions