Endpoint Security Fundamentals

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Listen to an AI-generated conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the easiest way to remove evidence of activity?

  • Use a virtual machine
  • Avoid creating the data in the first place (correct)
  • Use encryption
  • Run the OS from a removable drive

What can be used to make data unreadable without the encryption key?

  • Encryption (correct)
  • BleachBit
  • CCleaner
  • Portable apps

What can be used to hide data?

  • Portable apps (correct)
  • Encryption
  • Virtual machine
  • Removable drive

What is the benefit of running the OS from a removable drive?

<p>Data can be physically secured or destroyed (C)</p>
Signup and view all the answers

What can be used to secure data?

<p>Encryption (D)</p>
Signup and view all the answers

What can be used to delete all files created by the registry?

<p>Virtual machine (B)</p>
Signup and view all the answers

What can be used to wipe the VM securely?

<p>BleachBit (C)</p>
Signup and view all the answers

What can be used to make retrieving data more difficult?

<p>Portable apps (A)</p>
Signup and view all the answers

What can be used to clean up files and data?

<p>CCleaner (C)</p>
Signup and view all the answers

What is available on Windows, Mac, and Linux?

<p>CCleaner (D)</p>
Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Cybersecurity Fundamentals Quiz
12 questions

Cybersecurity Fundamentals Quiz

UnequivocalTundra9756 avatar
UnequivocalTundra9756
Endpoint Security for LANs
50 questions
Endpoint Security: Threats and Vulnerabilities
41 questions
Use Quizgecko on...
Browser
Browser