Endpoint Protection Flashcards
Which antimalware software approach can recognize various characteristics of known malware files to detect a threat?
Signature-based
In most host-based security suites, which function provides robust logging of security-related events and sends logs to a central location?
Telemetry
Which technology might increase the security challenge to the implementation of IoT in an enterprise environment?
Cloud Computing
Which statement describes the term attack surface?
It is the total sum of vulenrabilities in a system that is accessible to an attacker.
Which HIDS is an open-source based product?
OSSEC
Which device in a LAN infrastructure is susceptible to MAC address-table overflow and spoofing attacks?
Switch
As described by the SANS Institute, which attack surface includes the use of social engineering?
Human Attack Surface
What is a host-based intrusion detection system (HIDS)?
It combines the functionalities of antimalware application with firewall protection.
Which security endpoint setting would be used by a security analyst to determine if a computer has been configured to prevent a particular application from running?
Block Listing
In Windows Firewall, when is the Domain profile applied?
When the host is connected to a trusted network such as an internal business network.
As described by the SANS Institute, which attack surface includes the exploitation of vulnerabilities in wired and wireless protocols used by IoT devices?
Network Attack Surface
Which statement describes agentless antivirus protection?
Antivirus scans are performed on hosts from a centralized system.