Question
A company uses a firewall to filter incoming and
outgoing network traffic. Despite this, an attacker successfully accesses the network through a vulnerability in an employee’s workstation. Which additional security measure would have helped prevent this attack?Solution
A firewall is effective for filtering network traffic but cannot secure endpoints, such as employee workstations, against vulnerabilities or targeted attacks. Endpoint Detection and Response (EDR) tools: 1. Monitor and analyze endpoint activities for suspicious behavior. 2. Detect and mitigate threats like malware or unauthorized access in real-time. 3. Provide visibility into individual devices, complementing network-level defenses. By implementing EDR, organizations gain robust protection for endpoints, reducing the likelihood of breaches. Why Other Options Are Incorrect: • A) Hardware-based firewall: Enhances performance but does not protect endpoints directly. • C) Increasing firewall rules: Focuses only on network traffic, leaving endpoints vulnerable. • D) Disabling VPN access: Restricting remote access doesn't address the workstation’s vulnerability. • E) Restricting social media: While reducing distractions, this measure doesn’t enhance security.
Under the revised RBI instructions on hedging foreign exchange risk, users are allowed to hedge using exchange-traded foreign exchange derivatives. How...
What is the distinction between ethics and morality based on their scope?
According to the IRAC Norms, which of the following asset classifications applies to a loan where the borrower has defaulted on payment for over 12 mon...
In the preparation and presentation of financial statements, certain components are essential to provide a complete and transparent view of a company's ...
ABC Ltd stated the reason of poor performance of the company was the unsystematic risks faced by it in the current financial year. Which of the followin...
What is the name of the regulatory body that oversees the functioning of commodity futures trading in India?
Which global organization published the World Investment Report 2024?
Which of the following statements is correct regarding the RBI’s Master Direction on KYC for CPs and NCDs?
What is the purpose of the Udyam Assist Portal (UAP) certificate issued to Informal Micro Enterprises (IMEs)?
Sale of a security that is not owned by the seller is called?