システム管理者は境界ファイアウォールを設定しましたが、内部エンドポイント間の疑わしい接続が引き続き発生しています。疑わしいアクティビティによる脅威を軽減するには、次のうちどれを設定する必要がありますか?
正解:A
A host-based firewall is a software application that runs on an individual endpoint and filters the incoming and outgoing network traffic based on a set of rules. A host-based firewall can help to mitigate the threat posed by suspicious connections between internal endpoints by blocking or allowing the traffic based on the source, destination, port, protocol, or application. A host-based firewall is different from a web application firewall, which is a type of firewall that protects web applications from common web-based attacks, such as SQL injection, cross-site scripting, and session hijacking. A host-based firewall is also different from an access control list, which is a list of rules that control the access to network resources, such as files, folders, printers, or routers. A host-based firewall is also different from an application allow list, which is a list of applications that are authorized to run on an endpoint, preventing unauthorized or malicious applications from executing. Reference: CompTIA Security+ Study Guide: Exam SY0-701, 9th Edition, page 254