Endpoint Security Fundamentals

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the most effective way to avoid leaving evidence of activity?

  • Avoid creating the data in the first place (correct)
  • Use a virtual machine
  • Run the OS from a removable drive
  • Use a portable app

What is the importance of encryption in removing evidence of activity?

  • It deletes all files created by the registry
  • It secures data on a removable disk
  • It makes data recoverable without a key (correct)
  • It makes data readable without a key

What is the advantage of running the OS from a removable drive?

  • It deletes all files created by the registry
  • It makes data unrecoverable without the encryption key
  • It allows for physical security or destruction of the data (correct)
  • It makes data readable without a key

What is the promise of using a virtual machine?

<p>It allows for deletion of the VM with all the data (D)</p> Signup and view all the answers

What is the benefit of using portable apps?

<p>It makes retrieving the data more difficult (D)</p> Signup and view all the answers

What can be used if none of the previous methods were used?

<p>Programs like CCleaner and BleachBit (D)</p> Signup and view all the answers

What is the availability of CCleaner?

<p>Windows, Mac, and Linux (C)</p> Signup and view all the answers

What is the availability of BleachBit?

<p>Windows and Linux (D)</p> Signup and view all the answers

Why is it important to avoid creating data in the first place?

<p>A forensic expert will always find some data left behind (D)</p> Signup and view all the answers

What is the purpose of securely wiping the VM?

<p>To delete all the data after use (B)</p> Signup and view all the answers

A forensic expert can always recover deleted data from a computer.

<p>True (A)</p> Signup and view all the answers

Encryption can make data unrecoverable even if it is found.

<p>True (A)</p> Signup and view all the answers

Running the OS from a removable drive can completely eliminate evidence of activity.

<p>False (B)</p> Signup and view all the answers

Using a virtual machine can completely delete all files created by the registry.

<p>True (A)</p> Signup and view all the answers

CCleaner is only available on Windows.

<p>False (B)</p> Signup and view all the answers

BleachBit is available on all operating systems.

<p>False (B)</p> Signup and view all the answers

Portable apps can make it impossible to retrieve data.

<p>False (B)</p> Signup and view all the answers

CCleaner and BleachBit can be used to securely wipe data.

<p>True (A)</p> Signup and view all the answers

Running the OS from a removable drive can make data retrieval easier.

<p>False (B)</p> Signup and view all the answers

Using encryption can make data readable without the encryption key.

<p>False (B)</p> Signup and view all the answers

Using a virtual machine can make it impossible to retrieve data.

<p>False (B)</p> Signup and view all the answers

CCleaner is only available on Windows and Linux.

<p>True (A)</p> Signup and view all the answers

A forensic expert will always find some data left behind.

<p>True (A)</p> Signup and view all the answers

BleachBit is only available on Windows.

<p>False (B)</p> Signup and view all the answers

Running the OS from a removable drive can eliminate all evidence of activity.

<p>False (B)</p> Signup and view all the answers

Encryption can make data readable without the encryption key.

<p>False (B)</p> Signup and view all the answers

Avoiding creating data in the first place is the most effective way to remove evidence of activity.

<p>True (A)</p> Signup and view all the answers

CCleaner and BleachBit can be used to securely wipe data.

<p>True (A)</p> Signup and view all the answers

Using portable apps can make it impossible to retrieve data.

<p>False (B)</p> Signup and view all the answers

Encryption can make data unrecoverable even if it is found.

<p>True (A)</p> Signup and view all the answers

Avoiding creating data in the ______ place is the most effective way to remove evidence of activity.

<p>first</p> Signup and view all the answers

A forensic expert will always find some data left behind either on ______ or in the operating system registry.

<p>ram</p> Signup and view all the answers

Using ______ can make retrieving the data much more difficult.

<p>portable apps</p> Signup and view all the answers

The third option is running the OS from a ______ drive.

<p>removable</p> Signup and view all the answers

Using ______ can make data unrecoverable even if it is found.

<p>encryption</p> Signup and view all the answers

We can use programs like ______ if none of the previous methods were used.

<p>CCleaner</p> Signup and view all the answers

BleachBit is available on ______ and Linux.

<p>Windows</p> Signup and view all the answers

The promise of using a ______ machine is that we can delete the VM with all the data after we are done with our work.

<p>virtual</p> Signup and view all the answers

CCleaner is available on ______, Mac, and Linux.

<p>Windows</p> Signup and view all the answers

Running the OS from a ______ drive can make retrieving the data much more difficult.

<p>removable</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Cybersecurity Fundamentals Quiz
12 questions

Cybersecurity Fundamentals Quiz

UnequivocalTundra9756 avatar
UnequivocalTundra9756
Endpoint Security Fundamentals
10 questions
Securing Local Area Networks
98 questions
Use Quizgecko on...
Browser
Browser