|
4.3 Given a scenario, select the appropriate solution to establish host security.
- Operating system security and settings
- OS hardening
- Anti-malware
- Anti-virus
- Anti-spam
- Anti-spyware
- Pop-up blockers
- Patch management
- Whitelisting vs. blacklisting applications
- Trusted OS
- Host-based firewalls
- Hardware security
- Cable locks
- Safe
- Locking cabinets
- Host software baselining
- Virtualization
- Snapshots
- Patch compatibility
- Host availability/elasticity
- Security control testing
- Sandboxing
|
|
|