Home Fortinet EndPoint Quiz Answers NSE 2 Information Security Awareness Fortinet

EndPoint Quiz Answers NSE 2 Information Security Awareness Fortinet

0
763

Question 1: Which type of malware seriously reduced the effectiveness of signature-based antivirus?

  • Adware
  • File-based
  • Polymorphic
  • Social engineering

Question 2: Which attribute describes the earliest antivirus software?

  • Detection and response
  • Signature-based
  • Polymorphic
  • Machine learning

Question 3: What was the culmination of endpoint security development?

  • Artificial intelligence replaced EDR and EPP technologies
  • EPP remained but EDR technology fell out of favour
  • Web filtering technology replaced EPP
  • EDR and EPP technologies merged

Question 4: Identify two problems that are solved by having a single security agent on endpoints. (Choose two.)

  • Lack of integration between endpoint security products
  • Lack of visibility into how many endpoints have not applied the latest security patches
  • Multiple administration consoles adds complexity
  • Some users visit dangerous websites

Question 5: Which service is used as part of endpoint detection and response (EDR)?

  • Web filtering
  • Antivirus (AV)
  • Forensics investigation tool
  • Device control

Question 6: Which description best identifies file-based malware?

  • Exploits security loopholes and spreads only in the device memory
  • The use of deception to manipulate individuals into divulging confidential information
  • A large number of irrelevant or inappropriate messages sent over the internet
  • A downloaded file, which when opened, runs malicious code or a script

Question 7: Which two prevention-focused attributes are found in most contemporary endpoint security solutions? (Choose two.)

  • Remediation
  • Machine learning (ML)
  • Forensics
  • Virtual patches

Question 8: Which three prevention-focused services are found in endpoint protection platform (EPP)? (Choose three.)

  • Antivirus (AV)
  • Forensics
  • Remediation tools
  • Data protection through encryption
  • Web filtering

Question 9: Why do threat actors target endpoints in a network?

  • Endpoints have a greater monetary value than other assets, such as a database.
  • Compromising endpoints offers a greater challenge.
  • They are an easy point of entry into a network.
  • Antivirus software on endpoints is inferior to that on servers.

Question 10: Which two types of devices are considered endpoints, according to the description in the lesson? (Choose two.)

  • Databases
  • Computer devices used by end users
  • Internet of Things (IoT)
  • Servers

NO COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Please Comment for your required Exam Answers and we will try to provide you at shortest time. We truly value your contribution to the website. Thank you!!!