10 Questions
What is the easiest way to remove evidence of activity?
Avoid creating the data in the first place
What can be used to make data unreadable without the encryption key?
Encryption
What can be used to hide data?
Portable apps
What is the benefit of running the OS from a removable drive?
Data can be physically secured or destroyed
What can be used to secure data?
Encryption
What can be used to delete all files created by the registry?
Virtual machine
What can be used to wipe the VM securely?
BleachBit
What can be used to make retrieving data more difficult?
Portable apps
What can be used to clean up files and data?
CCleaner
What is available on Windows, Mac, and Linux?
CCleaner
Test your knowledge of endpoint security principles, technologies, and supporting technologies like disk encryption, anti-viruses, signatures, and AI. Learn why endpoint security is crucial in today's network environment. Evaluate your understanding of the importance of securing endpoint devices and the current state of network security.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free