nerdexam
IsacaIsaca

CDPSE · Question #82

CDPSE Question #82: Real Exam Question with Answer & Explanation

The correct answer is D: Hardening the operating systems of endpoint devices. The first consideration for ensuring that endpoints are protected in line with the privacy policy is hardening the operating systems of endpoint devices. Hardening is a process of applying security configurations and controls to reduce the attack surface and vulnerabilities of an

Privacy Architecture

Question

An organization wants to ensure that endpoints are protected in line with the privacy policy. Which of the following should be the FIRST consideration?

Options

  • ADetecting malicious access through endpoints
  • BImplementing network traffic filtering on endpoint devices
  • CManaging remote access and control
  • DHardening the operating systems of endpoint devices

Explanation

The first consideration for ensuring that endpoints are protected in line with the privacy policy is hardening the operating systems of endpoint devices. Hardening is a process of applying security configurations and controls to reduce the attack surface and vulnerabilities of an operating system. Hardening can include disabling unnecessary services and features, applying security patches and updates, enforcing strong passwords and encryption, configuring firewall and antivirus settings, and implementing least privilege principles. Hardening the operating systems of endpoint devices can help prevent unauthorized access, data leakage, malware infection, or other threats that may compromise the privacy of personal data stored or processed on those devices. Detecting malicious access through endpoints, implementing network traffic filtering on endpoint devices, and managing remote access and control are also important aspects of endpoint security, but they are not the first consideration. Rather, they are dependent on or complementary to hardening the operating systems of endpoint devices. For example, detecting malicious access requires having a baseline of normal activity and behavior on the endpoint device, which can be established by hardening. Implementing network traffic filtering requires having a firewall or other network security tool installed and configured on the endpoint device, which is part of hardening. Managing remote access and control requires having authentication and authorization mechanisms in place on the endpoint device, which is also part of hardening.

Topics

#Endpoint Security#OS Hardening#Foundational Security#Privacy by Design

Community Discussion

No community discussion yet for this question.

Full CDPSE PracticeBrowse All CDPSE Questions