Endpoint
Security Quiz Answers Nse 2Fig 1: Endpoint Security Quiz Answers NSE 2
Question 1: Which type of malware seriously reduced the effectiveness of signature-based antivirus?
· Adware
· File-based
· Polymorphic
· Social engineering
Question 2: Which attribute describes the earliest antivirus software?
· Detection and response
· Signature-based
· Polymorphic
· Machine learning
Question 3: What was the culmination of Endpoint Security development?
· Artificial intelligence replaced EDR and EPP technologies
· EPP remained but EDR technology fell out of favour
· Web filtering technology replaced EPP
· EDR and EPP technologies merged
Question 4: Identify two problems that are solved by having a single security agent on endpoints. (Choose two.)
· Lack of integration between endpoint security products
· Lack of visibility into how many endpoints have not applied the latest security patches
· Multiple administration consoles adds complexity
· Some users visit dangerous websites
Question 5: Which service is used as part of endpoint detection and response (EDR)?
· Web filtering
· Antivirus (AV)
· Forensics investigation tool
· Device control
Question 6: Which description best identifies file-based malware?
· Exploits security loopholes and spreads only in the device memory
· The use of deception to manipulate individuals into divulging confidential information
· A large number of irrelevant or inappropriate messages sent over the internet
· A downloaded file, which when opened, runs malicious code or a script
Question 7: Which two prevention-focused attributes are found in most contemporary endpoint security solutions? (Choose two.)
· Remediation
· Machine learning (ML)
· Forensics
· Virtual patches
Question 8: Which three prevention-focused services are found in endpoint protection platform (EPP)? (Choose three.)
· Antivirus (AV)
· Forensics
· Remediation tools
· Data protection through encryption
· Web filtering
Question 9: Why do threat actors target endpoints in a network?
· Endpoints have a greater monetary value than other assets, such as a database.
· Compromising endpoints offers a greater challenge.
· They are an easy point of entry into a network.
· Antivirus software on endpoints is inferior to that on servers.
Question 10: Which two types of devices are considered endpoints, according to the description in the lesson? (Choose two.)
· Databases
· Computer devices used by end users
· Internet of Things (IoT)
· Servers