CompTIA Security+ SY0-701 Practice Question
During an audit, your company's security policies regarding endpoint protection are under review. While examining the current solutions, you note that the recently deployed security system on critical endpoints is not relying solely on signature-based detection to mitigate attacks. Considering its capabilities, which feature of this system aligns with those of a robust HIPS to enhance the security of these endpoints?
Applying system hardening techniques to reduce the attack surface of the endpoints
Behavioral monitoring to analyze and block activities that may signify malicious intent
Updating its database of virus definitions frequently to catch the latest known malware
Performing retrospective log analysis to identify the source and method of a data breach