EndPoint Quiz Answers

Hello Friends in this article i am gone to share Fortinet: NSE 2 Information Security Awareness | EndPoint Quiz Answers with you..

Course link: NSE 2 Information Security Awareness


EndPoint Quiz Answers

Question 1)
Which type of malware seriously reduced the effectiveness of signature-based antivirus?

  • Polymorphic
  • Adware
  • File-based
  • Social engineering

Question 2)
Which attribute describes the earliest antivirus software?

  • Polymorphic
  • Machine learning
  • Detection and response
  • Signature-based

Question 3)
What was the culmination of endpoint security development?

  • Web filtering technology replaced EPP
  • EDR and EPP technologies merged
  • Artificial intelligence replaced EDR and EPP technologies
  • EPP remained but EDR technology fell out of favour

Question 4)
Identify two problems that are solved by having a single security agent on endpoints. (Choose two.)

  • Multiple administration consoles adds complexity
  • Some users visit dangerous websites
  • Lack of integration between endpoint security products
  • Lack of visibility into how many endpoints have not applied the latest security patches

Question 5)
Which service is used as part of endpoint detection and response (EDR)?

  • Device control
  • Web filtering
  • Antivirus (AV)
  • Forensics investigation tool

Question 6)
Which description best identifies file-based malware?

  • A downloaded file, which when opened, runs malicious code or a script
  • Exploits security loopholes and spreads only in the device memory
  • The use of deception to manipulate individuals into divulging confidential information
  • A large number of irrelevant or inappropriate messages sent over the internet

Question 7)
Which two prevention-focused attributes are found in most contemporary endpoint security solutions? (Choose two.)

  • Remediation
  • Forensics
  • Virtual patches
  • Machine learning (ML)

Question 8)
Which three prevention-focused services are found in endpoint protection platform (EPP)? (Choose three.)

  • Forensics
  • Web filtering
  • Antivirus (AV)
  • Remediation tools
  • Data protection through encryption

Question 9)
Why do threat actors target endpoints in a network?

  • Compromising endpoints offers a greater challenge.
  • They are an easy point of entry into a network.
  • Antivirus software on endpoints is inferior to that on servers.
  • Endpoints have a greater monetary value than other assets, such as a database.

Question 10)
Which two types of devices are considered endpoints, according to the description in the lesson? (Choose two.)

  • Servers
  • Databases
  • Computer devices used by end users
  • Internet of Things (IoT)

 

1 thought on “EndPoint Quiz Answers”

Leave a Comment