ExamGecko
Question list
Search
Search

Related questions











Question 312 - 200-201 discussion

Report
Export

Which items is an end-point application greylist used?

A.

Items that have been established as malicious

Answers
A.

Items that have been established as malicious

B.

Items that have been established as authorized

Answers
B.

Items that have been established as authorized

C.

Items that have been installed with a baseline

Answers
C.

Items that have been installed with a baseline

D.

Items before being established as harmful or malicious

Answers
D.

Items before being established as harmful or malicious

Suggested answer: D

Explanation:

A greylist in endpoint applications refers to a list of items that are not yet classified as either good (whitelisted) or bad (blacklisted).

The primary function of a greylist is to hold applications, processes, or files that are under observation due to their unknown status.

These items are neither trusted nor immediately flagged as harmful, allowing security teams to monitor them closely for any suspicious behavior.

By placing items on a greylist, security operations can prevent potential threats without disrupting legitimate processes, awaiting further analysis to determine their true nature.

Cisco Cybersecurity Operations Fundamentals

Endpoint Security Best Practices

Greylisting Concepts in Cybersecurity

asked 07/10/2024
Dantrez Griffin
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first