Review Questions - SYS701 - 11 - Endpoint Security
20 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Lin's hardware manufacturer has stopped selling the model of device that Lin's organization uses and has also stopped providing security or other updates. What phase of the hardware life cycle is the device in?

  • Legacy (correct)
  • End-of-life
  • End-of-sales
  • Senescence

Naomi has discovered the following TCP ports open on a system she wants to harden. Which ports are used for unsecure services and thus should be disabled to allow their secure equivalents to continue to be used?

  • 21 and 80
  • 21, 23, and 80 (correct)
  • 22 and 443
  • 21, 22, and 80

Frank's organization is preparing to deploy a data loss prevention (DLP) system. What key process should they undertake before they deploy it?

  • Define data life cycles for all nonsensitive data.
  • Encrypt all sensitive data.
  • Implement and use a data classification scheme. (correct)
  • Tag all data by creator or owner.

Oliver wants to store and manage secrets in his cloud service provider's environment. What type of solution should he look for as part of their offerings?

<p>A KMS (C)</p> Signup and view all the answers

What is the key difference between EDR and XDR solutions?

<p>The breadth of the technology stack that is covered (C)</p> Signup and view all the answers

Michelle wants to prevent unauthorized applications from being installed on a Windows system. What type of tool can she use to stop applications from being installed?

<p>A GPO (B)</p> Signup and view all the answers

What term is used to describe tools focused on detecting and responding to suspicious activities occurring on endpoints like desktops, laptops, and mobile devices?

<p>EDR (A)</p> Signup and view all the answers

Fred has recently purchased a network router and is preparing to deploy it. Which of the following is a common step in deploying new routers?

<p>Changing default passwords (D)</p> Signup and view all the answers

Charlene wants to prevent attacks against her system that leverage flaws in the services that it provides while still keeping the services accessible. What hardening technique should she use?

<p>A host-based IPS (B)</p> Signup and view all the answers

Allan is preparing to harden his organization's network switches. Which of the following is not a common hardening technique for network devices?

<p>Removing unnecessary software (A)</p> Signup and view all the answers

Helen's organization is planning to deploy IoT devices across their buildings as part of a HVAC system. Helen knows that the vendor for the IoT devices does not provide regular security updates to the device's web interfaces that are used to manage the devices. What security control should she recommend to help protect the devices on the network?

<p>Deploy the IoT devices to a protected VLAN. (B)</p> Signup and view all the answers

What is the primary reason to remove unnecessary software during hardening efforts?

<p>To reduce the attack footprint of the device (A)</p> Signup and view all the answers

Brian has deployed a system that monitors sensors and uses that data to manage the power distribution for the power company that he works for. Which of the following terms is commonly used to describe this type of control and monitoring solution?

<p>SCADA (A)</p> Signup and view all the answers

The organization that Lynn works for wants to deploy an embedded system that needs to process data as it comes in to the device without processing delays or other interruptions. What type of solution does Lynn's company need to deploy?

<p>An RTOS (D)</p> Signup and view all the answers

Which of the following is not a common constraint of an embedded system?

<p>Cost (B)</p> Signup and view all the answers

Jim configures a Windows machine with the built-in BitLocker full-disk encryption tool that uses a TPM chip. When is the machine least vulnerable to having data stolen from it?

<p>When the machine is off (A)</p> Signup and view all the answers

Olivia wants to install a host-based security package that can detect attacks against the system coming from the network, but she does not want to take the risk of blocking the attacks since she fears that she might inadvertently block legitimate traffic. What type of tool could she install that will meet this requirement?

<p>A host-based intrusion detection system (B)</p> Signup and view all the answers

Anita wants to enforce security settings across her organization's Windows Active Directory domain. What tool can she use to do this?

<p>Group Policy (B)</p> Signup and view all the answers

Chris wants systems that connect to his network to report their boot processes to a server where they can be validated before being permitted to join the network. What technology should he use to do this on the workstations?

<p>UEFI/Measured boot (C)</p> Signup and view all the answers

Elaine wants to securely erase the contents of a tape used for backups in her organization's tape library. What is the fastest secure erase method available to her that will allow the tape to be reused?

<p>Using a degausser (A)</p> Signup and view all the answers

Flashcards

Capital of France (example flashcard)

Paris

More Like This

Use Quizgecko on...
Browser
Browser