Home Uncategorised EndPoint Quiz Answers NSE 2 Information Security Awareness Fortinet

EndPoint Quiz Answers NSE 2 Information Security Awareness Fortinet

478
0

Question 1: Which type of malware seriously reduced the effectiveness of signature-based antivirus?

  • Adware
  • File-based
  • Polymorphic
  • Social engineering

Question 2: Which attribute describes the earliest antivirus software?

  • Detection and response
  • Signature-based
  • Polymorphic
  • Machine learning

Question 3: What was the culmination of endpoint security development?

  • Artificial intelligence replaced EDR and EPP technologies
  • EPP remained but EDR technology fell out of favour
  • Web filtering technology replaced EPP
  • EDR and EPP technologies merged

Question 4: Identify two problems that are solved by having a single security agent on endpoints. (Choose two.)

  • Lack of integration between endpoint security products
  • Lack of visibility into how many endpoints have not applied the latest security patches
  • Multiple administration consoles adds complexity
  • Some users visit dangerous websites

Question 5: Which service is used as part of endpoint detection and response (EDR)?

  • Web filtering
  • Antivirus (AV)
  • Forensics investigation tool
  • Device control

Question 6: Which description best identifies file-based malware?

  • Exploits security loopholes and spreads only in the device memory
  • The use of deception to manipulate individuals into divulging confidential information
  • A large number of irrelevant or inappropriate messages sent over the internet
  • A downloaded file, which when opened, runs malicious code or a script

Question 7: Which two prevention-focused attributes are found in most contemporary endpoint security solutions? (Choose two.)

  • Remediation
  • Machine learning (ML)
  • Forensics
  • Virtual patches

Question 8: Which three prevention-focused services are found in endpoint protection platform (EPP)? (Choose three.)

  • Antivirus (AV)
  • Forensics
  • Remediation tools
  • Data protection through encryption
  • Web filtering

Question 9: Why do threat actors target endpoints in a network?

  • Endpoints have a greater monetary value than other assets, such as a database.
  • Compromising endpoints offers a greater challenge.
  • They are an easy point of entry into a network.
  • Antivirus software on endpoints is inferior to that on servers.

Question 10: Which two types of devices are considered endpoints, according to the description in the lesson? (Choose two.)

  • Databases
  • Computer devices used by end users
  • Internet of Things (IoT)
  • Servers

LEAVE A REPLY

Please enter your comment!
Please enter your name here