Which feature is designed to reduce the attack surface by managing suspicious behaviors performed by trusted applications?
Which feature is designed to reduce the attack surface by managing suspicious behaviors performed by trusted applications?
A . Malware Prevention Configuration
B . Host Integrity Configuration
C . Adaptive Protection
D . Network Integrity Configuration
Answer: C
Explanation:
Adaptive Protection is designed to reduce the attack surface by managing suspicious behaviors performed by trusted applications. This feature provides dynamic, behavior-based protection that allows trusted applications to operate normally while monitoring and controlling any suspicious actions they might perform.
Purpose of Adaptive Protection: It monitors and restricts potentially harmful behaviors in applications that are generally trusted, thus reducing the risk of misuse or exploitation.
Attack Surface Reduction: By focusing on behavior rather than solely on known malicious files, Adaptive Protection effectively minimizes the risk of attacks that exploit legitimate applications.
Explanation of Why Other Options Are Less Likely:
Option A (Malware Prevention Configuration) targets malware but does not specifically control trusted applications’ behaviors.
Option B (Host Integrity Configuration) focuses on policy compliance rather than behavioral monitoring.
Option D (Network Integrity Configuration) deals with network-level threats, not application behaviors.
Therefore, Adaptive Protection is the feature best suited to reduce the attack surface by managing suspicious behaviors in trusted applications.
Latest 250-586 Dumps Valid Version with 75 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund