Fortinet Getting Started in Cybersecurity Endpoint Hardening Techniques Quiz

Endpoint Hardening Techniques Quiz Answers

Question: Which hardening endpoint category does the principle of least privilege belong to?

Question: Which two techniques can prevent access to information on stolen portable devices? (Choose two.)

Question: Which hardening endpoint category does boot management belong to?

Question: Which action can mitigate the exploitation of a computer using the administrator account reset procedure?

Question: Which technique hardens endpoints as a part of endpoint maintenance?

Question: Which technology has caused the number of endpoints to multiply exponentially?

Question: Which two techniques harden endpoints using common administrative controls? (Choose two.)

Question: Which technique allows you to recover content from a lost, stolen, damaged, or compromised device?


Endpoint Monitoring Quiz Answers

Question: Which three strategies help secure unknown endpoints? (Choose three.)

Question: Which two elements are a part of the endpoint monitoring category? (Choose two.)

Question: Which feature is a function of both EPP and EDR?

Question: Which feature is a function of endpoint detection and response (EDP)?

Question: Which two features are functions of an endpoint protection platform (EPP)? (Choose two.)

Question: Which platform can preemptively block new, undiscovered attacks?


Question 1

Question text

Which two types of devices are considered endpoints, according to the description in the lesson? (Choose two.)

Select one or more:

Question 2

Question text

Which description best identifies file-based malware?

Select one:

Question 3

Question text

Which three prevention-focused services are found in endpoint protection platform (EPP)? (Choose three.)

Select one or more:

Question text

Which type of malware seriously reduced the effectiveness of signature-based antivirus?

Select one:

Question 5

Question text

Which two prevention-focused attributes are found in most contemporary endpoint security solutions? (Choose two.)

Select one or more: