Which category includes examples such as Firewall, NAC, NAP, IPSec, and SSL to prevent threats?

Study for the EC-Council Network Defense Essentials Test. Utilize flashcards and multiple-choice questions, with each question accompanied by hints and explanations. Prepare effectively for your examination!

Multiple Choice

Which category includes examples such as Firewall, NAC, NAP, IPSec, and SSL to prevent threats?

Explanation:
Preventive controls are designed to stop threats before they affect systems. A firewall acts as a gatekeeper, filtering traffic and blocking anything that doesn’t meet the security policy, which directly stops unwanted access at the network boundary. Network access control and its successor NAP check devices and users before they’re allowed on the network, ensuring only compliant, trusted endpoints can connect. IPSec provides secure, authenticated, and encrypted IP communication, so data in transit remains confidential and tamper-proof, and unauthorized packets are rejected. SSL (TLS) secures applications by encrypting the channel and authenticating endpoints, preventing eavesdropping and man-in-the-middle tampering. Because these mechanisms are deployed to prevent threats from entering or moving within the network, they align with a preventive approach. Deterrence controls aim to discourage attacks rather than stop them, and a broader proactive approach includes activities like threat hunting and preparation—whereas the items listed are concrete measures that block or secure traffic before an incident occurs.

Preventive controls are designed to stop threats before they affect systems. A firewall acts as a gatekeeper, filtering traffic and blocking anything that doesn’t meet the security policy, which directly stops unwanted access at the network boundary. Network access control and its successor NAP check devices and users before they’re allowed on the network, ensuring only compliant, trusted endpoints can connect. IPSec provides secure, authenticated, and encrypted IP communication, so data in transit remains confidential and tamper-proof, and unauthorized packets are rejected. SSL (TLS) secures applications by encrypting the channel and authenticating endpoints, preventing eavesdropping and man-in-the-middle tampering.

Because these mechanisms are deployed to prevent threats from entering or moving within the network, they align with a preventive approach. Deterrence controls aim to discourage attacks rather than stop them, and a broader proactive approach includes activities like threat hunting and preparation—whereas the items listed are concrete measures that block or secure traffic before an incident occurs.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy