Sec+ - 10A - Implement Endpoint Security

Sec+ - 10A - Implement Endpoint Security

Professional Development

25 Qs

quiz-placeholder

Similar activities

Sec+ Day1 Security Concepts & Threat Types

Sec+ Day1 Security Concepts & Threat Types

Professional Development

22 Qs

A+ - 14D - Manage Windows Shares

A+ - 14D - Manage Windows Shares

Professional Development

27 Qs

ISC2 - CC - Chapter 3 - Module 3

ISC2 - CC - Chapter 3 - Module 3

Professional Development

24 Qs

A+ - 3B - Configure BIOS/UEFI

A+ - 3B - Configure BIOS/UEFI

Professional Development

22 Qs

Sec+ - 9A - Network Security Baselines

Sec+ - 9A - Network Security Baselines

Professional Development

21 Qs

AWS Basics and IAM

AWS Basics and IAM

Professional Development

21 Qs

A+ - 14C - Configure Windows Security Settings

A+ - 14C - Configure Windows Security Settings

Professional Development

25 Qs

SC-300: Identity and Access Administrator - TCS

SC-300: Identity and Access Administrator - TCS

Professional Development

24 Qs

Sec+ - 10A - Implement Endpoint Security

Sec+ - 10A - Implement Endpoint Security

Assessment

Passage

Computers

Professional Development

Medium

Created by

Brock McKinley

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of endpoint hardening?

To increase the functionality of an operating system

To minimize potential vulnerabilities and enhance system security

To improve user accessibility

To maximize attack surface

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a best practice for endpoint hardening

Removing unnecessary software

Limiting administrative privileges

Allowing unrestricted application installations

Strictly managing application updates

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the essential principle of least functionality in device hardening?

Systems should run only the protocols and services required by legitimate users

Systems should run as many protocols and services as possible

Systems should only run protocols and services for remote access

Systems should only run protocols and services for local access

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of persistent storage in device hardening?

To hold temporary data generated by applications

To store cached credentials securely

To hold user data generated by applications and cached credentials securely

To provide extra storage for applications

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What role do best practice baselines play in device hardening?

They complicate the system configuration

They provide a starting point for secure configurations

They limit access controls

They prioritize functionality over security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of segmentation in securing an enterprise environment?

To increase the attack surface

To limit the spread of cybersecurity incidents

To simplify an attacker's work

To reduce data protection and privacy

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does device isolation contribute to endpoint protection?

By increasing network traffic

  • By facilitating lateral spread of threats

By limiting interaction between devices

By expanding the attack surface

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?