NSE 2 Lesson 4 – NSE 2 Endpoint Security

NSE 2 Lesson 4 – NSE 2 Endpoint Security

Question 1

Question text

Which two types of devices are considered endpoints, according to the description in the lesson? (Choose two.)

Select one or more:

  • Computer devices used by end users
  • Internet of Things (IoT)
  • Databases
  • Servers

Question 2

Question text

Which description best identifies file-based malware?

Select one:

  • The use of deception to manipulate individuals into divulging confidential information
  • A large number of irrelevant or inappropriate messages sent over the internet
  • A downloaded file, which when opened, runs malicious code or a script
  • Exploits security loopholes and spreads only in the device memory

Question 3

Question text

Which three prevention-focused services are found in endpoint protection platform (EPP)? (Choose three.)

Select one or more:

  • Data protection through encryption
  • Forensics
  • Web filtering
  • Antivirus (AV)
  • Remediation tools

Question text

Which type of malware seriously reduced the effectiveness of signature-based antivirus?

Select one:

  • Social engineering
  • File-based
  • Polymorphic
  • Adware

Question 5

Question text

Which two prevention-focused attributes are found in most contemporary endpoint security solutions? (Choose two.)

Select one or more:

  • Machine learning (ML)
  • Forensics
  • Virtual patches
  • Remediation

NSE Lesson 5