Endpoint security software can:
A. Enforce network access policies by validating that security settings meet organizational standards.
B. Monitor usage for auditing and threat detection.
C. Limit network connectivity based on SSID names, encryption, and authentication parameters.
Incorrect:
D. Detecting rogue APs and clients is typically done by WIPS, not endpoint security agents.
[References:, , CWSP-208 Study Guide, Chapter 7 (Client Security and Endpoint Enforcement), , CWNP Endpoint Security and Compliance Policies, ]
Submit