Endpoint Security Fundamentals
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the most effective way to avoid leaving evidence of activity?

  • Avoid creating the data in the first place (correct)
  • Use a virtual machine
  • Run the OS from a removable drive
  • Use a portable app
  • What is the importance of encryption in removing evidence of activity?

  • It deletes all files created by the registry
  • It secures data on a removable disk
  • It makes data recoverable without a key (correct)
  • It makes data readable without a key
  • What is the advantage of running the OS from a removable drive?

  • It deletes all files created by the registry
  • It makes data unrecoverable without the encryption key
  • It allows for physical security or destruction of the data (correct)
  • It makes data readable without a key
  • What is the promise of using a virtual machine?

    <p>It allows for deletion of the VM with all the data</p> Signup and view all the answers

    What is the benefit of using portable apps?

    <p>It makes retrieving the data more difficult</p> Signup and view all the answers

    What can be used if none of the previous methods were used?

    <p>Programs like CCleaner and BleachBit</p> Signup and view all the answers

    What is the availability of CCleaner?

    <p>Windows, Mac, and Linux</p> Signup and view all the answers

    What is the availability of BleachBit?

    <p>Windows and Linux</p> Signup and view all the answers

    Why is it important to avoid creating data in the first place?

    <p>A forensic expert will always find some data left behind</p> Signup and view all the answers

    What is the purpose of securely wiping the VM?

    <p>To delete all the data after use</p> Signup and view all the answers

    A forensic expert can always recover deleted data from a computer.

    <p>True</p> Signup and view all the answers

    Encryption can make data unrecoverable even if it is found.

    <p>True</p> Signup and view all the answers

    Running the OS from a removable drive can completely eliminate evidence of activity.

    <p>False</p> Signup and view all the answers

    Using a virtual machine can completely delete all files created by the registry.

    <p>True</p> Signup and view all the answers

    CCleaner is only available on Windows.

    <p>False</p> Signup and view all the answers

    BleachBit is available on all operating systems.

    <p>False</p> Signup and view all the answers

    Portable apps can make it impossible to retrieve data.

    <p>False</p> Signup and view all the answers

    CCleaner and BleachBit can be used to securely wipe data.

    <p>True</p> Signup and view all the answers

    Running the OS from a removable drive can make data retrieval easier.

    <p>False</p> Signup and view all the answers

    Using encryption can make data readable without the encryption key.

    <p>False</p> Signup and view all the answers

    Using a virtual machine can make it impossible to retrieve data.

    <p>False</p> Signup and view all the answers

    CCleaner is only available on Windows and Linux.

    <p>True</p> Signup and view all the answers

    A forensic expert will always find some data left behind.

    <p>True</p> Signup and view all the answers

    BleachBit is only available on Windows.

    <p>False</p> Signup and view all the answers

    Running the OS from a removable drive can eliminate all evidence of activity.

    <p>False</p> Signup and view all the answers

    Encryption can make data readable without the encryption key.

    <p>False</p> Signup and view all the answers

    Avoiding creating data in the first place is the most effective way to remove evidence of activity.

    <p>True</p> Signup and view all the answers

    CCleaner and BleachBit can be used to securely wipe data.

    <p>True</p> Signup and view all the answers

    Using portable apps can make it impossible to retrieve data.

    <p>False</p> Signup and view all the answers

    Encryption can make data unrecoverable even if it is found.

    <p>True</p> Signup and view all the answers

    Avoiding creating data in the ______ place is the most effective way to remove evidence of activity.

    <p>first</p> Signup and view all the answers

    A forensic expert will always find some data left behind either on ______ or in the operating system registry.

    <p>ram</p> Signup and view all the answers

    Using ______ can make retrieving the data much more difficult.

    <p>portable apps</p> Signup and view all the answers

    The third option is running the OS from a ______ drive.

    <p>removable</p> Signup and view all the answers

    Using ______ can make data unrecoverable even if it is found.

    <p>encryption</p> Signup and view all the answers

    We can use programs like ______ if none of the previous methods were used.

    <p>CCleaner</p> Signup and view all the answers

    BleachBit is available on ______ and Linux.

    <p>Windows</p> Signup and view all the answers

    The promise of using a ______ machine is that we can delete the VM with all the data after we are done with our work.

    <p>virtual</p> Signup and view all the answers

    CCleaner is available on ______, Mac, and Linux.

    <p>Windows</p> Signup and view all the answers

    Running the OS from a ______ drive can make retrieving the data much more difficult.

    <p>removable</p> Signup and view all the answers

    More Like This

    TippingPoint: Quarantine Functionality
    23 questions
    Cybersecurity Fundamentals Quiz
    12 questions

    Cybersecurity Fundamentals Quiz

    UnequivocalTundra9756 avatar
    UnequivocalTundra9756
    Endpoint Security Fundamentals
    10 questions
    Use Quizgecko on...
    Browser
    Browser