Which three strategies help secure unknown endpoints?

Question image

Understand the Problem

The question is asking you to identify which three strategies are most effective in securing unknown endpoints within a network environment. This involves understanding common cybersecurity practices.

Answer

The three strategies are: isolate devices, configure network security, and enforce least privilege.

The three strategies that help secure unknown endpoints are:

  • Force devices onto an isolated network until they are secured and registered.
  • Configure network security devices to prevent unauthorized devices from accessing the network.
  • Enforce the principle of least privilege.
Answer for screen readers

The three strategies that help secure unknown endpoints are:

  • Force devices onto an isolated network until they are secured and registered.
  • Configure network security devices to prevent unauthorized devices from accessing the network.
  • Enforce the principle of least privilege.

More Information

These strategies help in identifying, controlling, and securing devices that connect to a network without prior authorization or knowledge.

Tips

Be sure to read the question carefully and look for key words such as unknown endpoints to help narrow down the possible answers.

AI-generated content may contain errors. Please verify critical information

Thank you for voting!
Use Quizgecko on...
Browser
Browser