An organization is reviewing endpoint security solutions.
In evaluating products, the organization has the following requirements: 1
Support server, laptop, and desktop infrastructure 2
Due to limited security resources, implement active protection capabilities 3
Provide users with the ability to self-service classify information and apply policies 4
Protect data-at-rest and data-in-use Which of the following endpoint capabilities would BEST meet the above requirements? (Choose two.)
Click on the arrows to vote for the correct answer
A. B. C. D. E. F.CD.
The two endpoint capabilities that would best meet the organization's requirements are:
A. Data loss prevention (DLP) and D. Rights management (RM).
Support server, laptop, and desktop infrastructure: DLP and RM solutions are designed to protect data on all endpoints, including servers, laptops, and desktops.
Due to limited security resources, implement active protection capabilities: DLP and RM solutions both provide active protection capabilities, allowing for the prevention of data breaches in real-time.
Provide users with the ability to self-service classify information and apply policies: RM solutions can enable users to classify data and apply policies to it, ensuring that sensitive information is protected from unauthorized access. DLP solutions can also provide this capability by allowing users to tag sensitive data and apply appropriate policies.
Protect data-at-rest and data-in-use: Both DLP and RM solutions can protect data-at-rest and data-in-use by applying appropriate policies and encryption techniques.
B. Application whitelisting (AW), Endpoint detect and respond (EDR), and Log monitoring (LM) do not fully meet the organization's requirements:
F. Antivirus (AV) is a security solution that detects and removes malware from systems, but it does not provide data protection or self-service classification capabilities.
Therefore, DLP and RM solutions would be the best endpoint capabilities to meet the organization's requirements.