Mitigation Technologies for Endpoint Threats Flashcards

1
Q

Name three examples of the most common types of malware?

A

Viruses, Worms, Trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name two Cisco supported open source antivirus software?

A

ClamAV, Immunet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give one statement that’s correct about back doors?

A

Back doors are created when a buffer overflow is exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cisco AMP for endpoints provides advanced malware protection for which operating systems?

A

Windows, Mac OSX, Android

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give four examples of e-mail encryption solutions?

A

Secure/Multipurpose Internet Mail Extensions, Pretty Good Privacy (PGP), GNU Privacy Guard (GnuPG), Web-based encryption e-mail services like Sendinc or JumbleME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What file types are supported by Cisco AMP for Endpoint?

A

PDF, MSCAB, ZIP, MACHO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give two examples of full disk encryption legitimate software?

A

File Vault, BitLocker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

VPN implementations can be categorized as what?

A

Site-to-Site VPNs, Remote-access VPNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly