Hello Friends in this article i am gone to share Fortinet: NSE 2 Information Security Awareness | EndPoint Quiz Answers with you..
Course link: NSE 2 Information Security Awareness
EndPoint Quiz Answers
Question 1)
Which type of malware seriously reduced the effectiveness of signature-based antivirus?
- Polymorphic
- Adware
- File-based
- Social engineering
Question 2)
Which attribute describes the earliest antivirus software?
- Polymorphic
- Machine learning
- Detection and response
- Signature-based
Question 3)
What was the culmination of endpoint security development?
- Web filtering technology replaced EPP
- EDR and EPP technologies merged
- Artificial intelligence replaced EDR and EPP technologies
- EPP remained but EDR technology fell out of favour
Question 4)
Identify two problems that are solved by having a single security agent on endpoints. (Choose two.)
- Multiple administration consoles adds complexity
- Some users visit dangerous websites
- Lack of integration between endpoint security products
- Lack of visibility into how many endpoints have not applied the latest security patches
Question 5)
Which service is used as part of endpoint detection and response (EDR)?
- Device control
- Web filtering
- Antivirus (AV)
- Forensics investigation tool
Question 6)
Which description best identifies file-based malware?
- A downloaded file, which when opened, runs malicious code or a script
- Exploits security loopholes and spreads only in the device memory
- The use of deception to manipulate individuals into divulging confidential information
- A large number of irrelevant or inappropriate messages sent over the internet
Question 7)
Which two prevention-focused attributes are found in most contemporary endpoint security solutions? (Choose two.)
- Remediation
- Forensics
- Virtual patches
- Machine learning (ML)
Question 8)
Which three prevention-focused services are found in endpoint protection platform (EPP)? (Choose three.)
- Forensics
- Web filtering
- Antivirus (AV)
- Remediation tools
- Data protection through encryption
Question 9)
Why do threat actors target endpoints in a network?
- Compromising endpoints offers a greater challenge.
- They are an easy point of entry into a network.
- Antivirus software on endpoints is inferior to that on servers.
- Endpoints have a greater monetary value than other assets, such as a database.
Question 10)
Which two types of devices are considered endpoints, according to the description in the lesson? (Choose two.)
- Servers
- Databases
- Computer devices used by end users
- Internet of Things (IoT)
You’ve the most impressive websites.