Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

This Study Resource Was

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

What is the common name for remote computing devices that communicate back and

forth with a network to which they are connected?


Endpoint
A single program responsible for scanning, detecting, and removing malware,
spyware, adware, ransomware and other such malicious entities.
Antivirus
A centrally managed solution that protects networks and all their endpoints
against threats with the help of various security tools:
End security
Which of the following are features of Endpoint Security solutions?
All
Which among the following usually refers to an on-premise solution?
Endpoint security
Testing can readily be done in production environment.
True
Testing can be done effectively only on a system connected to the internet.
False
Preventing users from accessing known dangerous locations on the internet,
plugging in uncontrolled devices to their computer comes under
Preventing
Endpoint security solutions provide a decentralized solution to protect
endpoints.

m
False

er as
Which of the following are essential features to ensure data security?

co
All

eH w
is an organized approach to addressing and managing the aftermath of a security
breach or cyberattack.

o.
Response rs e
Network security solutions cannot be used to identify attacks in progress.
ou urc
False
is responsible for filtering the traffic flowing in and out of a network based
on �a set of security rules�.
Firewall
o

Privilege escalation is an
aC s

False positive
v i y re

Which of the following aspects help analyze the effectiveness of an endpoint


security solution?
All
Which among the following is more focused on securing networks?
Network
ed d

It is safest to test ransomware by using one-at-a-time approach.


ar stu

True
Which of the following approaches to testing is most appropriate when the
results are expected to be precise?
Many
Which feature of anti-virus softwares removes or isolates potentially malicious
sh is

files and applications?


File
Th

is the term that is used to refer to the method by which a malicious portable
executable has reached an endpoint.
Starg?faslse

Which of the following feature of endpoint security solutions involves real time
monitoring of network topology, connections, and traffic flow?
Continuos

Which among the following usually refers to a cloud-based solution?


rotection
Which of the following is a portable executable?
portable executable

is a technique where attackers modify legitimate software to hide a malicious


application.
Code caves

This study source was downloaded by 100000822998721 from CourseHero.com on 08-03-2021 05:53:48 GMT -05:00

https://www.coursehero.com/file/64037198/end-securitytxt/
Preventing users from accessing known dangerous locations on the internet,
plugging in uncontrolled devices to their computer comes under
Attack surface

m
er as
co
eH w
o.
rs e
ou urc
o
aC s
v i y re
ed d
ar stu
sh is
Th

This study source was downloaded by 100000822998721 from CourseHero.com on 08-03-2021 05:53:48 GMT -05:00

https://www.coursehero.com/file/64037198/end-securitytxt/
Powered by TCPDF (www.tcpdf.org)

You might also like