Host isolation involves separating a device from network access or restricting its ability to communicate with other resources on the network. This ensures that the device is inaccessible to other network-connected resources, preventing potential unauthorized access or communication.
Breakdown of the other options:
A. Disablement of unused services: Helps improve security by turning off unnecessary services but does not fully isolate a device from the network.
B. Web application firewall (WAF): Protects web applications by filtering and monitoring HTTP traffic but does not prevent a device from being accessible to other network resources.
D. Network-based IDS (Intrusion Detection System): Monitors network traffic for malicious activity but does not actively isolate a device from the network.
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
test_arrow
1 day, 14 hours ago