Which three strategies help secure unknown endpoints?
![Question image](https://assets.quizgecko.com/question_images/REshAnZc3plvS7Dld0cqHipiCKJIz6xVaVnEPaWo.png)
Understand the Problem
The question asks which three strategies are helpful to secure unknown endpoints from a list of options.
Answer
The three strategies are: enforce least privilege, isolate unknown devices, and configure network security.
The three strategies that help secure unknown endpoints are: Enforcing the principle of least privilege, forcing devices onto an isolated network until secured and registered, and configuring network security devices to prevent unauthorized access.
Answer for screen readers
The three strategies that help secure unknown endpoints are: Enforcing the principle of least privilege, forcing devices onto an isolated network until secured and registered, and configuring network security devices to prevent unauthorized access.
More Information
Securing unknown endpoints is crucial for maintaining a strong security posture. Implementing these strategies reduces the risk of unauthorized access and potential breaches.
Tips
A common mistake is selecting options that address known endpoints rather than focusing on the particular challenges posed by unknown devices.
Sources
AI-generated content may contain errors. Please verify critical information