Q: 5
Which security technology allows only a set of pre-approved applications to run on a system?
Options
Discussion
Option C is the one here. Application-level whitelisting only lets pre-approved apps execute, while B (host-based IPS) generally catches known threats but doesn't default-deny by app name. I see why B trips people up, but it's not actually a whitelist. Makes sense?
C’s the best fit. Only application-level whitelisting actually defaults to allowing just approved apps, while HIPS might block bad stuff but doesn’t always default-deny. Pretty sure that matches the question’s wording, unless I missed a trick.
Nah, I don’t think it’s B. C fits because whitelisting lets only approved apps run, so nothing else starts by default. Blacklisting is the trap answer since it just blocks specific bad apps instead of allowing only the safe ones. Anyone see a reason to pick B?
C vs B-have seen similar questions in practice where some argue host-based IPS can restrict apps, but only C (application-level whitelisting) strictly allows execution of pre-approved software. B can block bad behavior but isn't always default-deny. Pretty sure C is what they want unless they're focusing on device rules, not just app list control. Someone disagree?
Cisco makes this sound complicated just to test whitelisting basics, C imo
C tbh. Blacklisting (A) lets most things run unless specifically blocked, so it's a trap here. Whitelisting is the one that only allows what you specify. Pretty sure that's what the question wants.
Honestly, Cisco loves their buzzwords but this one's straight up C
Remember seeing a similar scenario from labs, pretty sure it's C. Only application-level whitelisting blocks anything not pre-approved. B monitors for bad behavior, but doesn't default deny every app. Anyone disagree?
C here.
Yeah, C here. Only application-level whitelisting strictly enforces approved apps only. B could block stuff too but not by default.
Be respectful. No spam.