An organization is implementing a comprehensive host-based endpoint security strategy. Which of the following approaches would provide the BEST protection against advanced threats while minimizing performance impact?
The correct answer is application whitelisting. Application whitelisting operates on a default-deny principle where only specifically approved applications are allowed to run, making it extremely effective against malware, zero-day attacks, and unauthorized software. It prevents execution of unauthorized code, which is the foundation of most attacks.
While antivirus software is important, it relies primarily on signature-based detection which can miss new or modified threats. Full disk encryption protects data at rest but does not prevent malicious code execution. Host-based firewalls filter network traffic but don't prevent authorized applications from being exploited or running malicious code that doesn't require network access.
Application whitelisting provides superior protection by ensuring only trusted applications can execute, effectively blocking most attack vectors before they can cause damage, while maintaining reasonable system performance compared to behavioral analysis solutions that constantly monitor all system activities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does application whitelisting work in more detail?
Open an interactive chat with Bash
What are zero-day attacks and how does application whitelisting protect against them?
Open an interactive chat with Bash
Why are traditional antivirus solutions less effective against advanced threats compared to application whitelisting?
Open an interactive chat with Bash
ISC2 CISSP
Communication and Network Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access