Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

I was reviewing your answer for the question below and believe that you have posted the wrong answer. Chegg believes that the answer is D,

I was reviewing your answer for the question below and believe that you have posted the wrong answer. Chegg believes that the answer is D, UTM. I don't think that's correct....

A recent security assessment revealed that an actor exploited a vulnerable workstation within an organization and has persisted on the network for several months. The organization realizes the need to reassess its security strategy for mitigating risk within the perimeter. Which of the following solutions would best support the organization's strategy?

A FIM

B DLP

C EDR

D UTM

I believe that the answer is C, EDR. Look at the product descriptions below.

EDR is...

- Sometimes called endpoint threat detection and response (ET D r ), provides continuous monitoring of endpoints. Edr tools are part of the defense in-depth strategy. There isn't a standard set of capabilities that all ER platforms include. However, they commonly include anti- malware solutions, host- based intrusion detection systems (HIDSs), and application allow and block lists.

- A software agent that collects system data and logs for analysis by a monitoring system to provide early detection of threats.

- EDR isnt necessarily focused on prevention. The idea is to provide a layered solution that assumes something may not have been prevented. As a result, the goal of EDR is to detect and respond. EDR technology often uses a combination of machine learning and behavioral analytics to detect suspicious activity. Today EDR plays a predominant role as part of an overall endpoint security strategy.

UTM is...

- An approach to information security where a single hardware or software installation provides multiple security functions. This contrasts with the traditional method of having point solutions for each security function.

- In addition to functioning as a firewall these devices come with other capabilities such as:

1. URL filtering/ content inspection

2. Malware inspection

3. Spam filtering

4. Channel Service Unit/Data Service Unit CSU (network provider side)/DSU (customer Sude) - Multiprotocol Label Switching

5. Router, switch

6. IDS/IPS

7. Bandwidth shaper

8. VPN endpoint

9. TLS/SSL Proxy

10. Web Filtering

11. QoS Management

12. Bandwidth Throttling

13. Network Address Translation (NAT) - UTM simplifies information-security management by providing a single management and reporting point for the security administrator rather than managing multiple products from different vendors.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

MongoDB Applied Design Patterns Practical Use Cases With The Leading NoSQL Database

Authors: Rick Copeland

1st Edition

1449340040, 978-1449340049

More Books

Students also viewed these Databases questions

Question

What is meant by subsumption ? What steps are necessary for this

Answered: 1 week ago

Question

What are Measures in OLAP Cubes?

Answered: 1 week ago

Question

How do OLAP Databases provide for Drilling Down into data?

Answered: 1 week ago

Question

How are OLAP Cubes different from Production Relational Databases?

Answered: 1 week ago