Table of Contents
Question
When a next-generation endpoint security solution is selected for a company, what are two key deliverables that help justify the implementation? (Choose two.)
A. signature-based endpoint protection on company endpoints
B. email integration to protect endpoints from malicious content that is located in email
C. real-time feeds from global threat intelligence centers
D. macro-based protection to keep connected endpoints safe
E. continuous monitoring of all files that are located on connected endpoints
Answer
C. real-time feeds from global threat intelligence centers
E. continuous monitoring of all files that are located on connected endpoints
Explanation
When a next-generation endpoint security solution is selected for a company, two key deliverables that help justify the implementation are:
C. Real-time feeds from global threat intelligence centers
E. Continuous monitoring of all files that are located on connected endpoints
C. Real-time feeds from global threat intelligence centers:
Next-generation endpoint security solutions often include the capability to receive real-time threat intelligence feeds from global security centers. These threat intelligence feeds provide up-to-date information on the latest known threats, vulnerabilities, and attack patterns observed worldwide. By integrating such feeds into the endpoint security solution, the company can enhance its ability to detect and respond to emerging threats promptly. Real-time feeds ensure that the endpoint security solution is constantly updated with the latest threat information, enabling it to stay ahead of new and sophisticated attacks.
E. Continuous monitoring of all files that are located on connected endpoints:
Next-generation endpoint security solutions typically include advanced file monitoring capabilities. These solutions continuously monitor all files present on connected endpoints, such as workstations and servers. The continuous monitoring ensures that any suspicious or malicious activities related to files, such as unauthorized access, modification, or execution of potentially harmful files, are promptly detected and mitigated. This level of monitoring greatly enhances the company’s security posture by providing real-time visibility into potential threats and enabling immediate responses to prevent or limit any damages caused by malware or other malicious files.
Justification for the choices:
A. Signature-based endpoint protection on company endpoints:
Signature-based endpoint protection is a traditional approach to security that involves using predefined patterns (signatures) of known threats to identify and block malicious activities. While this is an essential security component, it alone may not be enough to justify the implementation of a next-generation endpoint security solution. Next-generation solutions typically include additional advanced features beyond signature-based protection, which offer greater defense against modern and evolving threats.
B. Email integration to protect endpoints from malicious content that is located in email:
While email integration is indeed important for securing endpoints from email-borne threats, it is just one aspect of endpoint security. This feature primarily addresses email-specific risks and may not be sufficient on its own to justify the implementation of a next-generation endpoint security solution. The two selected deliverables (real-time threat intelligence feeds and continuous file monitoring) have broader implications for overall endpoint protection and are essential components of a comprehensive next-generation endpoint security approach.
D. Macro-based protection to keep connected endpoints safe:
Macro-based protection refers to safeguarding against malicious macros commonly found in documents, spreadsheets, and other files. While this feature is valuable in defending against a specific type of threat, it alone may not be sufficient to justify the implementation of a next-generation endpoint security solution. The two selected deliverables (real-time threat intelligence feeds and continuous file monitoring) offer broader and more comprehensive protection against a wide range of threats, making them more critical in justifying the implementation of the solution.
Reference
- What is Next Generation Endpoint Security (NGES)? | Deep Instinct
- Best Next-Gen Endpoint Security Solutions for 2021 (esecurityplanet.com)
- Overview of next-generation protection in Microsoft Defender for Endpoint | Microsoft Learn
- What Is Next-Generation Endpoint Security? | Trellix
- Demystifying: Next-Generation Endpoint Security – Cisco Blogs
- Safe Browsing & Endpoint Isolation – BUFFERZONE (bufferzonesecurity.com)
- vmwcb-report-evaluating-next-generation-endpoint-security.pdf (vmware.com)
- Trend Micro Announces Next Generation ICS Endpoint Security Solution – May 3, 2021
- Which Next-generation Endpoint Security Enhancements Are Required (fortinet.com)
- Cyber Security Tools: What is Next-Gen Endpoint Security? | BizTech Magazine
Implementing and Operating Cisco Security Core Technologies 350-701 certification exam practice question and answer (Q&A) dump with detail explanation and reference available free, helpful to pass the Implementing and Operating Cisco Security Core Technologies 350-701 exam and earn Implementing and Operating Cisco Security Core Technologies 350-701 certification.