Search Header Logo

Assesment ESET (2025)

Authored by Adi Saputra

Information Technology (IT)

Professional Development

Used 5+ times

Assesment ESET (2025)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Indah's company recently faced a ransomware attack that encrypted many important files. To recover these files, she needs to use a specific ESET feature designed for this purpose. The ESET feature that functions as recovery or restore of files from a ransomware attack is

Ransomware Rollback

Ransomware Remediation

Ransomware Shield

Ransomware Scanner

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

In a corporate environment, Indah is responsible for managing the communication between various security agents deployed across the network. She needs to ensure that these agents can communicate effectively and efficiently. The main function of ESET Bridge is

To store event database

To perform caching and forwarding of agent communication

To perform load balancing of the web console

To perform updates and collect them as a mirror

3.

MULTIPLE SELECT QUESTION

30 sec • 5 pts

In the Linux operating system, an error sometimes occurs in "Realtime protection". The steps that need to be taken are

Update OS and restart OS

Upgrade or downgrade kernel

Disable secure boot or configure private key

Disable SELinux

4.

MULTIPLE SELECT QUESTION

30 sec • 5 pts

Dian is preparing to set up a new software on his computer. To perform offline installation, he needs to use the file

live_installer.exe

offlinepackage.dat

install_config.ini

epi_installer.bin

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

To protect the Agent and Endpoint in a corporate environment, Adi implemented several security measures. He decided to focus on the following:

Password protection

Tamper protection

Override mode

Brute-force attack protection

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

During a cybersecurity seminar, a speaker discusses how ESET can prevent ransomware attacks with various features. However, one of the features mentioned does not actually help in preventing such attacks. Which of the following features is it?

Ransomware Shield

ESET LiveGrid*

Brute-force attack Protection

Potentially unwanted/unsafe Application

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

In a corporate environment, Adi is responsible for managing the security settings of the company's computers using HIPS. He can create rules to control (allow/block) access to various targets, except for

Files

Application

Registry

Services

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?