🎖️🏵️ Memorial Weekend Sale — 30% off🎖️🏵️

CompTIA Study Materials
AWS Study Materials
AWS Certified Developer Associate AWS Certified Developer Associate
AWS Certified Developer Associate DVA-C02
AWS Certified Solutions Architect Associate AWS Certified Solutions Architect Associate
AWS Certified Solutions Architect Associate SAA-C03
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Free CompTIA Security+ SY0-701 Practice Question

During an audit, your company's security policies regarding endpoint protection are under review. While examining the current solutions, you note that the recently deployed security system on critical endpoints is not relying solely on signature-based detection to mitigate attacks. Considering its capabilities, which feature of this system aligns with those of a robust HIPS to enhance the security of these endpoints?

  • Performing retrospective log analysis to identify the source and method of a data breach

  • Applying system hardening techniques to reduce the attack surface of the endpoints

  • Updating its database of virus definitions frequently to catch the latest known malware

  • Behavioral monitoring to analyze and block activities that may signify malicious intent

This question is for objective:
Threats, Vulnerabilities, and Mitigations
Your Score:
Threats, Vulnerabilities, and Mitigations
Security Architecture
Security Operations
Security Program Management and Oversight
General Security Concepts