Endpoint Security Fundamentals
10 Questions
4 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the easiest way to remove evidence of activity?

  • Use a virtual machine
  • Avoid creating the data in the first place (correct)
  • Use encryption
  • Run the OS from a removable drive
  • What can be used to make data unreadable without the encryption key?

  • Encryption (correct)
  • BleachBit
  • CCleaner
  • Portable apps
  • What can be used to hide data?

  • Portable apps (correct)
  • Encryption
  • Virtual machine
  • Removable drive
  • What is the benefit of running the OS from a removable drive?

    <p>Data can be physically secured or destroyed</p> Signup and view all the answers

    What can be used to secure data?

    <p>Encryption</p> Signup and view all the answers

    What can be used to delete all files created by the registry?

    <p>Virtual machine</p> Signup and view all the answers

    What can be used to wipe the VM securely?

    <p>BleachBit</p> Signup and view all the answers

    What can be used to make retrieving data more difficult?

    <p>Portable apps</p> Signup and view all the answers

    What can be used to clean up files and data?

    <p>CCleaner</p> Signup and view all the answers

    What is available on Windows, Mac, and Linux?

    <p>CCleaner</p> Signup and view all the answers

    More Like This

    TippingPoint: Quarantine Functionality
    23 questions
    Cybersecurity Fundamentals Quiz
    12 questions

    Cybersecurity Fundamentals Quiz

    UnequivocalTundra9756 avatar
    UnequivocalTundra9756
    Endpoint Security Fundamentals
    40 questions
    Use Quizgecko on...
    Browser
    Browser