4.0 Application, Data and Host Security


4.3 Given a scenario, select the appropriate solution to establish host security.

  • Operating system security and settings
  • OS hardening
  • Anti-malware
    • Anti-virus
    • Anti-spam
    • Anti-spyware
    • Pop-up blockers
  • Patch management
  • Whitelisting vs. blacklisting applications
  • Trusted OS
  • Host-based firewalls
  • Hardware security
    • Cable locks
    • Safe
    • Locking cabinets
  • Host software baselining
  • Virtualization
    • Snapshots
    • Patch compatibility
    • Host availability/elasticity
    • Security control testing
    • Sandboxing

Recommended

 





Associates