Sec+ - 10A - Implement Endpoint Security
Passage
•
Computers
•
Professional Development
•
Medium
Brock McKinley
Used 2+ times
FREE Resource
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of endpoint hardening?
To increase the functionality of an operating system
To minimize potential vulnerabilities and enhance system security
To improve user accessibility
To maximize attack surface
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a best practice for endpoint hardening
Removing unnecessary software
Limiting administrative privileges
Allowing unrestricted application installations
Strictly managing application updates
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the essential principle of least functionality in device hardening?
Systems should run only the protocols and services required by legitimate users
Systems should run as many protocols and services as possible
Systems should only run protocols and services for remote access
Systems should only run protocols and services for local access
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of persistent storage in device hardening?
To hold temporary data generated by applications
To store cached credentials securely
To hold user data generated by applications and cached credentials securely
To provide extra storage for applications
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What role do best practice baselines play in device hardening?
They complicate the system configuration
They provide a starting point for secure configurations
They limit access controls
They prioritize functionality over security
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of segmentation in securing an enterprise environment?
To increase the attack surface
To limit the spread of cybersecurity incidents
To simplify an attacker's work
To reduce data protection and privacy
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does device isolation contribute to endpoint protection?
By increasing network traffic
By facilitating lateral spread of threats
By limiting interaction between devices
By expanding the attack surface
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
22 questions
ICT30120 Certificate III in Information Technology
Quiz
•
Professional Development
26 questions
Entrepreneurship
Quiz
•
4th Grade - Professio...
25 questions
HTML
Quiz
•
5th Grade - Professio...
24 questions
CompTIA A+ 1001 Set #2 (short set)
Quiz
•
Professional Development
23 questions
Computers
Quiz
•
Professional Development
21 questions
Computer
Quiz
•
6th Grade - Professio...
21 questions
ENGLISH
Quiz
•
Professional Development
22 questions
Java Chapter 2 Review Questions
Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
6 questions
FOREST Self-Discipline
Lesson
•
1st - 5th Grade
7 questions
Veteran's Day
Interactive video
•
3rd Grade
20 questions
Weekly Prefix check #2
Quiz
•
4th - 7th Grade
Discover more resources for Computers
10 questions
Identifying Phishing Emails Quiz
Quiz
•
Professional Development
14 questions
2019 Logos
Quiz
•
Professional Development
7 questions
Tone and Mood Quick Check
Quiz
•
Professional Development
32 questions
Abbreviations and Equivalents
Lesson
•
6th Grade - Professio...
5 questions
11.4.25 Student Engagement & Discourse
Lesson
•
Professional Development
