ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 51 - SY0-701 discussion

Report
Export

A systems administrator set up a perimeter firewall but continues to notice suspicious connections between internal endpoints. Which of the following should be set up in order to mitigate the threat posed by the suspicious activity?

A.
Host-based firewall
Answers
A.
Host-based firewall
B.
Web application firewall
Answers
B.
Web application firewall
C.
Access control list
Answers
C.
Access control list
D.
Application allow list
Answers
D.
Application allow list
Suggested answer: A

Explanation:

A host-based firewall is a software application that runs on an individual endpoint and filters the incoming and outgoing network traffic based on a set of rules. A host-based firewall can help to mitigate the threat posed by suspicious connections between internal endpoints by blocking or allowing the traffic based on the source, destination, port, protocol, or application. A host-based firewall is different from a web application firewall, which is a type of firewall that protects web applications from common web-based attacks, such as SQL injection, cross-site scripting, and session hijacking. A host-based firewall is also different from an access control list, which is a list of rules that control the access to network resources, such as files, folders, printers, or routers.A host-based firewall is also different from an application allow list, which is a list of applications that are authorized to run on an endpoint, preventing unauthorized or malicious applications from executing.Reference:CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, page 254

asked 02/10/2024
Adam Burdett
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first