Thanks for Visiting my channel
Fortinet Getting Started in Cybersecurity Endpoint Hardening Techniques Quiz
Endpoint Hardening Techniques Quiz Answers
Question: Which hardening endpoint category does the principle of least privilege belong to?
Endpoint monitoring
Administrative controls
Endpoint maintenance
Local endpoint protection
Question: Which two techniques can prevent access to information on stolen portable devices? (Choose two.)
Encrypt the data stored on the device
Install antivirus software
Use data loss prevention (DLP)
Ensure strong password protection
Question: Which hardening endpoint category does boot management belong to?
Endpoint monitoring
Endpoint maintenance
Local endpoint protection
Administrative controls
Question: Which action can mitigate the exploitation of a computer using the administrator account reset procedure?
Update security patches
Change administrator passwords regularly
Ensure the computer is physically secure
Install antivirus software
Question: Which technique hardens endpoints as a part of endpoint maintenance?
Data loss prevention (DLP)
Automatic-updates and patching
Startup hardening
Boot management
Question: Which technology has caused the number of endpoints to multiply exponentially?
Artificial intelligence (AI)
Cloud services
Internet of things (IoT)
Virtualization
Question: Which two techniques harden endpoints using common administrative controls? (Choose two.)
Backups
User restrictions
Policy checks
Passwords
Question: Which technique allows you to recover content from a lost, stolen, damaged, or compromised device?
Back up the data
Install antivirus software
Encrypt the disk
Buy insurance
Endpoint Monitoring Quiz Answers
Question: Which three strategies help secure unknown endpoints? (Choose three.)
Configure network security devices to prevent unauthorized devices from accessing the network
Enforce the principle of least privilege
Upgrade antivirus software on all known network devices
Force devices onto an isolated network until they are secured and registered
Migrate network assets from a local physical network to the cloud
Question: Which two elements are a part of the endpoint monitoring category? (Choose two.)
Endpoint auditing
Endpoint protection platform (EPP)
Data loss prevention (DLP)
Intrusion detection systems (IDS)
Question: Which feature is a function of both EPP and EDR?
Enforcement of security policies
Administrative top-down visibility
Data loss prevention
Antivirus scanning
Question: Which feature is a function of endpoint detection and response (EDP)?
Enforces strong passwords
Predicts malware using large databases of known attacks
Enforces security policies
Data loss prevention
Question: Which two features are functions of an endpoint protection platform (EPP)? (Choose two.)
Enforces security policies
Updates a malware detection rule based on a CVE alert
Predicts malware using large databases of known attacks
Verifies versions of software and firmware
Question: Which platform can preemptively block new, undiscovered attacks?
Zero trust network access
Next generation firewall
Endpoint management system
Endpoint detection and response
Question 1
Question text
Which two types of devices are considered endpoints, according to the description in the lesson? (Choose two.)
Select one or more:
Computer devices used by end users
Internet of Things (IoT)
Databases
Servers
Question 2
Question text
Which description best identifies file-based malware?
Select one:
The use of deception to manipulate individuals into divulging confidential information
A large number of irrelevant or inappropriate messages sent over the internet
A downloaded file, which when opened, runs malicious code or a script
Exploits security loopholes and spreads only in the device memory
Question 3
Question text
Which three prevention-focused services are found in endpoint protection platform (EPP)? (Choose three.)
Select one or more:
Data protection through encryption
Forensics
Web filtering
Antivirus (AV)
Remediation tools
Question text
Which type of malware seriously reduced the effectiveness of signature-based antivirus?
Select one:
Social engineering
File-based
Polymorphic
Adware
Question 5
Question text
Which two prevention-focused attributes are found in most contemporary endpoint security solutions? (Choose two.)
Select one or more:
Machine learning (ML)
Forensics
Virtual patches
Remediation
No comments:
Post a Comment