You are on page 1of 2

8/23/2020 EndPoint Quiz: Attempt review

 The Evolution of Cybersecurity

Started on Sunday, August 23, 2020, 3:39 PM


State Finished
Completed on Sunday, August 23, 2020, 3:46 PM
Time taken 7 mins 1 sec
Points 10/10
Grade 100 out of 100
Feedback Congratulations, you passed!

Question 1 Why do threat actors target endpoints in a network?


Correct

1 points out of 1 Select one:


Antivirus software on endpoints is inferior to that on servers.

They are an easy point of entry into a network. 

Compromising endpoints offers a greater challenge.

Endpoints have a greater monetary value than other assets, such as a database.

Question 2 Identify two problems that are solved by having a single security agent on endpoints. (Choose two.)
Correct

1 points out of 1 Select one or more:


Lack of integration between endpoint security products 

Lack of visibility into how many endpoints have not applied the latest security patches

Multiple administration consoles adds complexity 

Some users visit dangerous websites

Question 3 Which two types of devices are considered endpoints, according to the description in the lesson? (Choose two.)
Correct

1 points out of 1 Select one or more:


Computer devices used by end users 

Servers

Databases

Internet of Things (IoT) 

Question 4 Which attribute describes the earliest antivirus software?


Correct

1 points out of 1 Select one:


Detection and response

Signature-based 

Polymorphic

Machine learning

Question 5 Which type of malware seriously reduced the effectiveness of signature-based antivirus?
Correct

1 points out of 1 Select one:


Adware

Social engineering

File-based
https://training.fortinet.com/mod/quiz/review.php?attempt=4999429&cmid=71247 1/2
8/23/2020 EndPoint Quiz: Attempt review

Polymorphic 

Question 6 Which two prevention-focused attributes are found in most contemporary endpoint security solutions? (Choose two.)
Correct

1 points out of 1 Select one or more:


Remediation

Forensics

Machine learning (ML) 

Virtual patches 

Question 7 What was the culmination of endpoint security development?


Correct

1 points out of 1 Select one:


Web filtering technology replaced EPP

EPP remained but EDR technology fell out of favour

EDR and EPP technologies merged 

Artificial intelligence replaced EDR and EPP technologies

Question 8 Which description best identifies file-based malware?


Correct

1 points out of 1 Select one:


The use of deception to manipulate individuals into divulging confidential information

A large number of irrelevant or inappropriate messages sent over the internet

A downloaded file, which when opened, runs malicious code or a script 

Exploits security loopholes and spreads only in the device memory

Question 9 Which three prevention-focused services are found in endpoint protection platform (EPP)? (Choose three.)
Correct

1 points out of 1 Select one or more:


Forensics

Web filtering 

Remediation tools

Data protection through encryption 

Antivirus (AV) 

Question 10 Which service is used as part of endpoint detection and response (EDR)?
Correct

1 points out of 1 Select one:


Web filtering

Forensics investigation tool 

Antivirus (AV)

Device control

https://training.fortinet.com/mod/quiz/review.php?attempt=4999429&cmid=71247 2/2

You might also like