Step-by-Step Explanation:
Option A: Deny list
Deny lists block specific applications or processes identified as malicious.
This approach is reactive and mayinadvertently block the non-standard applications that are currently in use without proper ownership.
Option B: Allow list
Allow lists permit only pre-approved applications to run.
While secure, this approach requires defining all non-standard applications, which may disrupt operations in an environment where ownership is unclear.
Option C: Audit mode
Correct Answer.
Audit mode allows monitoring and logging of applications without enforcing restrictions.
This is ideal in environments with non-standard applications and undefined ownership because it enables the engineer to observe the environment and gradually implement control without interruption.
Audit mode provides critical visibility into the software landscape, ensuring that necessary applications remain functional.
Option D: MAC list
Mandatory Access Control (MAC) lists restrict access based on classification and clearance levels.
This does not align with application control objectives in this context.
CompTIA CASP+ Study Guide - Chapters on Endpoint Security and Application Control.
CASP+ Objective 2.4: Implement appropriate security controls for enterprise endpoints.
Submit