What is the endpoint in a network?
The device used by the user, such as a desktop, laptop, or mobile device.
What can applications running on an endpoint be exploited for?
To gain access to the user’s data or other sensitive information.
What is required to identify malicious software?
Monitoring both inbound and outbound information.
What does a layered approach to security involve?
Having different types of security solutions on all devices.
Where is security typically first implemented in an organization?
At the edge of the network.
What is the role of a firewall at the network edge?
To monitor all traffic going from the inside to the outside and vice versa.
What does access control describe?
The ability to limit a device’s access to a certain type of data.
Name a parameter that can be used to create access control rules.
What can access control lists do?
They can be modified or removed at any time.
What is a posture assessment?
A check to ensure that devices are up to date with the latest security technologies.
When is a good time to perform a posture assessment?
When a device first connects to the network or logs in remotely.
What is a trusted device identified by?
A company certificate.
What is the purpose of full disk encryption?
To protect the storage of remote devices.
What is a persistent agent?
Software installed permanently on devices to monitor files and applications.
What is a dissolvable agent?
Software that runs during login and removes itself after execution.
What is Agentless Network Access Control (NAC)?
An agent integrated with Active Directory that runs during login/logout.
What options does a security administrator have if a device fails a posture assessment?
How many virus variants are estimated to be created every day?
Over a million.
What does EDR stand for?
Endpoint Detection and Response.
What is the primary function of EDR?
To extend visibility into behavioral analysis and monitor processes.
What additional capability does EDR provide compared to traditional antivirus?
Root-cause analysis.
What is XDR?
Extended Detection and Response.
What does XDR enhance in terms of security monitoring?
It provides additional intelligence and a larger scope of data input.
What is the key benefit of using XDR?
To correlate data across multiple systems and improve threat detection.