Which endpoint security technology should be used to prevent any incoming connections to the host?
- host-based personal firewall
- host-based antivirus
- host-based IDS
- host-based malware protection
Explanation & Hint:
To prevent any incoming connections to a host, the most appropriate endpoint security technology to use is: Host-based personal firewall. A host-based personal firewall is designed to control and restrict network connections to and from an individual host. It can be configured to block incoming connections and traffic, providing protection against unauthorized access and potential threats. This is especially important for preventing unauthorized or malicious incoming connections to the host. Host-based personal firewalls allow users to define rules and policies to control network access, making them an effective choice for this purpose. |