Endpoint Protection Flashcards

1
Q

Which antimalware software approach can recognize various characteristics of known malware files to detect a threat?

A

Signature-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In most host-based security suites, which function provides robust logging of security-related events and sends logs to a central location?

A

Telemetry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which technology might increase the security challenge to the implementation of IoT in an enterprise environment?

A

Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which statement describes the term attack surface?

A

It is the total sum of vulenrabilities in a system that is accessible to an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which HIDS is an open-source based product?

A

OSSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which device in a LAN infrastructure is susceptible to MAC address-table overflow and spoofing attacks?

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

As described by the SANS Institute, which attack surface includes the use of social engineering?

A

Human Attack Surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a host-based intrusion detection system (HIDS)?

A

It combines the functionalities of antimalware application with firewall protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which security endpoint setting would be used by a security analyst to determine if a computer has been configured to prevent a particular application from running?

A

Block Listing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In Windows Firewall, when is the Domain profile applied?

A

When the host is connected to a trusted network such as an internal business network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

As described by the SANS Institute, which attack surface includes the exploitation of vulnerabilities in wired and wireless protocols used by IoT devices?

A

Network Attack Surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which statement describes agentless antivirus protection?

A

Antivirus scans are performed on hosts from a centralized system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly