Endpoint
Security Quiz Answers NSE 2Fig 1: Endpoint Security Quiz Answers NSE 2
Question 1: Which type of malware seriously reduced the effectiveness of signature-based antivirus?
·
Adware
·
File-based
·
Polymorphic
·
Social engineering
Question 2: Which attribute describes the earliest antivirus
software?
·
Detection and response
·
Signature-based
·
Polymorphic
·
Machine learning
Question 3: What was the culmination of endpoint security
development?
·
Artificial intelligence replaced EDR and EPP technologies
·
EPP remained but EDR technology fell out of favour
·
Web filtering technology replaced EPP
·
EDR and EPP technologies merged
Question 4: Identify two problems that are solved by having a
single security agent on endpoints. (Choose two.)
·
Lack of integration between endpoint security
products
·
Lack of visibility into how many endpoints have not applied the
latest security patches
·
Multiple administration consoles adds
complexity
·
Some users visit dangerous websites
Question 5: Which service is used as part of endpoint detection
and response (EDR)?
·
Web filtering
·
Antivirus (AV)
·
Forensics investigation tool
·
Device control
Question 6: Which description best identifies file-based
malware?
·
Exploits security loopholes and spreads only in the device
memory
·
The use of deception to manipulate individuals into divulging
confidential information
·
A large number of irrelevant or inappropriate messages sent over
the internet
·
A downloaded file, which when opened, runs
malicious code or a script
Question 7: Which two prevention-focused attributes are found in
most contemporary endpoint security solutions? (Choose two.)
·
Remediation
·
Machine learning (ML)
·
Forensics
·
Virtual patches
Question 8: Which three prevention-focused services are found in
endpoint protection platform (EPP)? (Choose three.)
·
Antivirus (AV)
·
Forensics
·
Remediation tools
·
Data protection through encryption
·
Web filtering
Question 9: Why do threat actors target endpoints in a network?
·
Endpoints have a greater monetary value than other assets, such
as a database.
·
Compromising endpoints offers a greater challenge.
·
They are an easy point of entry into a
network.
·
Antivirus software on endpoints is inferior to that on servers.
Question 10: Which two types of devices are considered
endpoints, according to the description in the lesson? (Choose two.)
·
Databases
·
Computer devices used by end users
·
Internet of Things (IoT)
· Servers
0 Comments