in Technology by

Does the security solution effectuate the security functions it is intended to perform?

Please log in or register to answer this question.

1 Answer

0 votes
by

Two primary attack vectors are exploited to compromise endpoints:

  • Malicious executables (malware)

  • Vulnerability exploits

Effective endpoint security solutions (products or technologies), must prevent malware and exploits (known and unknown variants) from compromising endpoints and servers.

Related questions

0 votes
asked Nov 11, 2021 in Education by JackTerrance
0 votes
asked Aug 18, 2022 in Education by JackTerrance
0 votes
asked Nov 2, 2021 in Education by JackTerrance
...