7 Questions
What are some examples of endpoint devices?
Desktops, laptops, smartphones, and tablets.
What do IT security teams monitor endpoints for?
Malware, vulnerabilities, and user circumvention.
How can controlling applications on endpoints create a more secure environment?
By using approved lists and deny lists to control applications.
What are two ways to control applications on endpoints?
Approved lists and deny lists.
What are deny lists often used for?
Anti-virus and anti-malware software often have their own deny lists.
What can endpoint security software do regarding malicious applications?
Remove them and quarantine them.
What are digital signatures used for regarding applications?
To allow or disallow applications from certain developers.
Study Notes
- Endpoint devices include desktops, laptops, smartphones, and tablets.
- IT security teams monitor endpoints for malware, vulnerabilities, and user circumvention.
- Controlling applications on endpoints can create a more secure environment.
- Approved lists and deny lists are two ways to control applications.
- Anti-virus and anti-malware software often have their own deny lists.
- Endpoint security software can remove malicious applications and quarantine them.
- Operating systems have built-in functionality to allow or deny application execution.
- Digital signatures can be used to allow or disallow applications from certain developers.
- Limiting permissions to specific folders can create a trusted area of the storage drive.
- Policies can be set to allow or disallow applications based on the zone they are executing from.
Are you up-to-date on endpoint security? Test your knowledge with this quiz! Learn about controlling applications on endpoints, deny lists, digital signatures, and more. Keywords: endpoint security, malware, deny lists, digital signatures, permissions, policies.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free