ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 464 - SY0-601 discussion

Report
Export

Which of the following can best protect against an employee inadvertently installing malware on a company system?

A.
Host-based firewall
Answers
A.
Host-based firewall
B.
System isolation
Answers
B.
System isolation
C.
Least privilege
Answers
C.
Least privilege
D.
Application allow list
Answers
D.
Application allow list
Suggested answer: C

Explanation:

Least privilege is a security principle that states that users should only be granted the permissions they need to do their job. This helps to protect against malware infections by preventing users from installing unauthorized software.

A host-based firewall can help to protect against malware infections by blocking malicious traffic from reaching a computer. However, it cannot prevent a user from installing malware if they have the necessary permissions.

System isolation is the practice of isolating systems from each other to prevent malware from spreading. T his can be done by using virtual machines or network segmentation. However, system isolation can be complex and expensive to implement.

An application allow list is a list of applications that are allowed to run on a computer. This can help to prevent malware infections by preventing users from running unauthorized applications. However,

an application allow list can be difficult to maintain and can block legitimate applications.

Therefore, the best way to protect against an employee inadvertently installing malware on a company system is to use the principle of least privilege. This will help to ensure that users only have the permissions they need to do their job, which will reduce the risk of malware infections.

Here are some additional benefits of least privilege:

It can help to improve security by reducing the attack surface.

It can help to simplify security management by reducing the number of permissions that need to be managed.

It can help to improve compliance by reducing the risk of data breaches.

asked 02/10/2024
LAURA Camacho
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first