Thanks for Visiting my channel
Fortinet Getting Started in Cybersecurity Endpoint Monitoring Quiz Answers
Endpoint Monitoring Quiz Answers
Question: Which three strategies help secure unknown endpoints? (Choose three.)
Configure network security devices to prevent unauthorized devices from accessing the network
Enforce the principle of least privilege
Upgrade antivirus software on all known network devices
Force devices onto an isolated network until they are secured and registered
Migrate network assets from a local physical network to the cloud
Question: Which two elements are a part of the endpoint monitoring category? (Choose two.)
Endpoint auditing
Endpoint protection platform (EPP)
Data loss prevention (DLP)
Intrusion detection systems (IDS)
Question: Which feature is a function of both EPP and EDR?
Enforcement of security policies
Administrative top-down visibility
Data loss prevention
Antivirus scanning
Question: Which feature is a function of endpoint detection and response (EDP)?
Enforces strong passwords
Predicts malware using large databases of known attacks
Enforces security policies
Data loss prevention
Question: Which two features are functions of an endpoint protection platform (EPP)? (Choose two.)
Enforces security policies
Updates a malware detection rule based on a CVE alert
Predicts malware using large databases of known attacks
Verifies versions of software and firmware
Question: Which platform can preemptively block new, undiscovered attacks?
Zero trust network access
Next generation firewall
Endpoint management system
Endpoint detection and response
Question 1
Question text
Which two types of devices are considered endpoints, according to the description in the lesson? (Choose two.)
Select one or more:
Computer devices used by end users
Internet of Things (IoT)
Databases
Servers
Question 2
Question text
Which description best identifies file-based malware?
Select one:
The use of deception to manipulate individuals into divulging confidential information
A large number of irrelevant or inappropriate messages sent over the internet
A downloaded file, which when opened, runs malicious code or a script
Exploits security loopholes and spreads only in the device memory
Question 3
Question text
Which three prevention-focused services are found in endpoint protection platform (EPP)? (Choose three.)
Select one or more:
Data protection through encryption
Forensics
Web filtering
Antivirus (AV)
Remediation tools
Question text
Which type of malware seriously reduced the effectiveness of signature-based antivirus?
Select one:
Social engineering
File-based
Polymorphic
Adware
Question 5
Question text
Which two prevention-focused attributes are found in most contemporary endpoint security solutions? (Choose two.)
Select one or more:
Machine learning (ML)
Forensics
Virtual patches
Remediation
No comments:
Post a Comment