Question 1: Which type of malware seriously reduced the effectiveness of signature-based antivirus?
- Adware
- File-based
- Polymorphic
- Social engineering
Question 2: Which attribute describes the earliest antivirus software?
- Detection and response
- Signature-based
- Polymorphic
- Machine learning
Question 3: What was the culmination of endpoint security development?
- Artificial intelligence replaced EDR and EPP technologies
- EPP remained but EDR technology fell out of favour
- Web filtering technology replaced EPP
- EDR and EPP technologies merged
Question 4: Identify two problems that are solved by having a single security agent on endpoints. (Choose two.)
- Lack of integration between endpoint security products
- Lack of visibility into how many endpoints have not applied the latest security patches
- Multiple administration consoles adds complexity
- Some users visit dangerous websites
Question 5: Which service is used as part of endpoint detection and response (EDR)?
- Web filtering
- Antivirus (AV)
- Forensics investigation tool
- Device control
Question 6: Which description best identifies file-based malware?
- Exploits security loopholes and spreads only in the device memory
- The use of deception to manipulate individuals into divulging confidential information
- A large number of irrelevant or inappropriate messages sent over the internet
- A downloaded file, which when opened, runs malicious code or a script
Question 7: Which two prevention-focused attributes are found in most contemporary endpoint security solutions? (Choose two.)
- Remediation
- Machine learning (ML)
- Forensics
- Virtual patches
Question 8: Which three prevention-focused services are found in endpoint protection platform (EPP)? (Choose three.)
- Antivirus (AV)
- Forensics
- Remediation tools
- Data protection through encryption
- Web filtering
Question 9: Why do threat actors target endpoints in a network?
- Endpoints have a greater monetary value than other assets, such as a database.
- Compromising endpoints offers a greater challenge.
- They are an easy point of entry into a network.
- Antivirus software on endpoints is inferior to that on servers.
Question 10: Which two types of devices are considered endpoints, according to the description in the lesson? (Choose two.)
- Databases
- Computer devices used by end users
- Internet of Things (IoT)
- Servers