
Lesson 10
Authored by Benjamin Fenton
Other
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes the purpose of device hardening for endpoints like laptops and desktops?
Deploying only legacy applications to reduce compatibility errors
Minimizing the attack surface by removing or disabling unneeded services and software
Installing as much software as possible to increase feature availability
Limiting user access to the internet to avoid performance problems
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security architect wants to ensure that every device connecting to the corporate network meets a standardized security checklist for configuration (for example, ensuring certain ports are closed, USB devices are disabled, etc.). Which of the following mechanisms is designed to verify and remediate deviations from that checklist?
Network segmentation
Baseline configuration and deviation reporting
Port mirroring
Encryption at rest
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization is worried about malware spreading laterally between workstations. The security team configures VLANs so that devices in the finance department are isolated from those in the marketing department. Which of the following describes this security strategy?
Air gapping
Network segmentation
Zero-day containment
Virtual patching
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A systems administrator wants to guarantee that malicious or unauthorized scripts cannot run on corporate endpoints. The organization decides to only permit scripts that are explicitly approved. Which of the following describes this approach?
Data loss prevention (DLP)
Allow (whitelist) execution policy
Mobile device management (MDM)
Block (blacklist) execution policy
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a benefit of full disk encryption (FDE) on a laptop?
It eliminates the need for password-based authentication.
It immediately blocks all incoming network connections by default.
It protects data if the device is lost or stolen.
It increases the speed of data access from the disk.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not typically managed by a mobile device management (MDM) solution?
Enforcing screen lock and passcode settings
Managing virtual machine operating system file permissions for server clusters
Tracking devices and enforcing remote wipes
Pushing application and OS updates to smartphones
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A network administrator notices that the host-based intrusion detection system (HIDS) on a server is alerting on unusual changes to a critical system file. Which of the following features is the HIDS most likely using?
A. File integrity monitoring (FIM)
B. Honeypot logs
C. Dynamic ARP inspection (DAI)
D. Certificate pinning
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?