Endpoint Protection Flashcards

1
Q

Who is attacking SMBs and MSPs

A

Organized criminal groups/malicious actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How are SMBs being attacked?

A

Polymorphic malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is polymorphic malware?

A

Malware that constantly changes in order to evade detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does polymorphic malware evade detection? 3 ways

A

Propagates itself with unique file hashes or piggy back on application scripts, inject themselves into memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What percentage of malware were seen on single PCs?

A

94%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What percentage of reported infections were consumers/home users?

A

64%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Who is at greater risk for infection?

A

Employees working from home.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the result of an infected home PC?

A

Fines, infected network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can remote workers infect computers?

A

Opening Emails, infected web ads, web links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why are old security methods not cutting it?

A

Attackers are exploiting traditional security methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What can block and protect endpoints?

A

Endpoint Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is endpoint protection? 4 things

A

Brightcloud threat intelligence, Advanced machine learning, Informed Behavior Based, Comprehensive multi layered approach to security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does endpoint protect against? 4 things

A

Dangerous links, script attacks like powershell and macros, malicious apps and advertisements, physically connected devices like flash drives and blended threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the multi layered approach?

A

Attack, Delivery, Infection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is endpoint important?

A

Key factor in identifying and stopping threats in their tracks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What percentage of breaches were by organized criminal groups?

A

55%

17
Q

What do outdated AV solutions do?

A

They are only effective once and infection is already on the system.

18
Q

What does delivery mode do?

A

Protects against adware, spyware, ransomware, phishing, key loggers, root kits and leverages real time protection shields.

19
Q

What is the infection stage? What does it do? Name 6 benefits

A

Pre and post execution intervention with evasion shielding that blocks malicious scripts, zero day malware, behavioral detection, monitoring, quarantining, roll back and auto remediation all managed under a single pane of glass online management console.