NSE 2 Lesson 4 – NSE 2 Endpoint Security
Question 1
Question text
Which two types of devices are considered endpoints, according to the description in the lesson? (Choose two.)
Select one or more:
- Computer devices used by end users
- Internet of Things (IoT)
- Databases
- Servers
Question 2
Question text
Which description best identifies file-based malware?
Select one:
- The use of deception to manipulate individuals into divulging confidential information
- A large number of irrelevant or inappropriate messages sent over the internet
- A downloaded file, which when opened, runs malicious code or a script
- Exploits security loopholes and spreads only in the device memory
Question 3
Question text
Which three prevention-focused services are found in endpoint protection platform (EPP)? (Choose three.)
Select one or more:
- Data protection through encryption
- Forensics
- Web filtering
- Antivirus (AV)
- Remediation tools
Question text
Which type of malware seriously reduced the effectiveness of signature-based antivirus?
Select one:
- Social engineering
- File-based
- Polymorphic
- Adware
Question 5
Question text
Which two prevention-focused attributes are found in most contemporary endpoint security solutions? (Choose two.)
Select one or more:
- Machine learning (ML)
- Forensics
- Virtual patches
- Remediation