nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #367

CERTIFIED-IN-CYBERSECURITY Question #367: Real Exam Question with Answer & Explanation

The correct answer is C: Whitelisting. Whitelisting is a security technique that only allows authorized applications or software to run on a system or network while blocking all other software. In practice, this authorization requires creating a list of approved applications and blocking all other software. This techn

Access Controls Concepts

Question

What technology is used to ensure authorized software is used within an organization? ()

Options

  • ABlacklisting
  • BConfiguration management
  • CWhitelisting
  • DGreylisting

Explanation

Whitelisting is a security technique that only allows authorized applications or software to run on a system or network while blocking all other software. In practice, this authorization requires creating a list of approved applications and blocking all other software. This technique provides greater control over software usage and helps prevent malware and unauthorized applications from being installed on a system or network. Blacklisting, on the other hand, blocks known malicious software but does not prevent unknown threats. Configuration management is a technique used to manage hardware, software, firmware, documentation, and process changes. Graylisting is a technique that temporarily blocks emails from unknown senders and requires the sender to resend the email (see ISC2 Study Guide, Chapter 5, under Module 2).

Topics

#Application whitelisting#Software authorization#Access control

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions