Which three strategies help secure unknown endpoints?

Understand the Problem
The question is asking you to identify which three strategies are most effective in securing unknown endpoints within a network environment. This involves understanding common cybersecurity practices.
Answer
The three strategies are: isolate devices, configure network security, and enforce least privilege.
The three strategies that help secure unknown endpoints are:
- Force devices onto an isolated network until they are secured and registered.
- Configure network security devices to prevent unauthorized devices from accessing the network.
- Enforce the principle of least privilege.
Answer for screen readers
The three strategies that help secure unknown endpoints are:
- Force devices onto an isolated network until they are secured and registered.
- Configure network security devices to prevent unauthorized devices from accessing the network.
- Enforce the principle of least privilege.
More Information
These strategies help in identifying, controlling, and securing devices that connect to a network without prior authorization or knowledge.
Tips
Be sure to read the question carefully and look for key words such as unknown endpoints to help narrow down the possible answers.
Sources
- Answers to: Which three strategies help secure unknown endpoints ... - classace.io
- Quiz - Endpoint Monitoring Attempt review (pdf) - CliffsNotes - cliffsnotes.com
AI-generated content may contain errors. Please verify critical information