Which of the following techniques describes the use of application isolation during execution to prevent system compromise if the application is compromised?
A.
Least privilege
B.
Sandboxing
C.
Black box
D.
Application hardening
Explanation:
Sandboxing is the process of isolating a system before installing new applications on it so as to restrict any potential malware that may be embedded in the new
application from being able to cause harm to production systems.
Incorrect Answers:
A: The principle of least privilege is used to ensure that users are only provided with the minimum privileges and permissions that allow them to perform their
duties.
C: Black box testing is a form of penetration testing in which the tester has absolutely no knowledge of the system or it how it functions. This simulates an attack
from an outsider. It does not involve application isolation.
D: Hardening is the process of securing a system by reducing its surface of vulnerability. Reducing the surface of vulnerability typically includes removing or
disabling unnecessary functions and features, removing or disabling unnecessary user accounts, disabling unnecessary protocols and ports, and disabling
unnecessary services.Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, Sixth Edition, Sybex, Indianapolis, 2014, pp 153, 203, 204-205, 215-217, 459
Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, pp 82, 208, 221, 250