CERTIFIED-IN-CYBERSECURITY · Question #367
CERTIFIED-IN-CYBERSECURITY Question #367: Real Exam Question with Answer & Explanation
The correct answer is C: Whitelisting. Whitelisting is a security technique that only allows authorized applications or software to run on a system or network while blocking all other software. In practice, this authorization requires creating a list of approved applications and blocking all other software. This techn
Question
What technology is used to ensure authorized software is used within an organization? ()
Options
- ABlacklisting
- BConfiguration management
- CWhitelisting
- DGreylisting
Explanation
Whitelisting is a security technique that only allows authorized applications or software to run on a system or network while blocking all other software. In practice, this authorization requires creating a list of approved applications and blocking all other software. This technique provides greater control over software usage and helps prevent malware and unauthorized applications from being installed on a system or network. Blacklisting, on the other hand, blocks known malicious software but does not prevent unknown threats. Configuration management is a technique used to manage hardware, software, firmware, documentation, and process changes. Graylisting is a technique that temporarily blocks emails from unknown senders and requires the sender to resend the email (see ISC2 Study Guide, Chapter 5, under Module 2).
Topics
Community Discussion
No community discussion yet for this question.