Which feature is designed to reduce the attack surface by managing suspicious behaviors performed by trusted applications?
A . Malware Prevention Configuration
B . Host Integrity Configuration
C . Adaptive Protection
D . Network Integrity Configuration
Answer: C
Explanation:
Adaptive Protection is designed to reduce the attack surface by managing suspicious behaviors performed by trusted applications. This feature provides dynamic, behavior-based protection that allows trusted applications to operate normally while monitoring and controlling any suspicious actions they might perform.
Purpose of Adaptive Protection: It monitors and restricts potentially harmful behaviors in applications that are generally trusted, thus reducing the risk of misuse or exploitation.
Attack Surface Reduction: By focusing on behavior rather than solely on known malicious files, Adaptive Protection effectively minimizes the risk of attacks that exploit legitimate applications.
Explanation of Why Other Options Are Less Likely:
Option A (Malware Prevention Configuration) targets malware but does not specifically control trusted applications’ behaviors.
Option B (Host Integrity Configuration) focuses on policy compliance rather than behavioral monitoring.
Option D (Network Integrity Configuration) deals with network-level threats, not application behaviors.
Therefore, Adaptive Protection is the feature best suited to reduce the attack surface by managing suspicious behaviors in trusted applications.
Latest 250-586 Dumps Valid Version with 75 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund