Lesson 08: Endpoint Hardening Techniques Quiz Answers
Question: Which hardening endpoint category does the principle of least privilege belong to?
- Endpoint monitoring
- Administrative controls
- Endpoint maintenance
- Local endpoint protection
Question: Which two techniques can prevent access to information on stolen portable devices? (Choose two.)
- Encrypt the data stored on the device
- Install antivirus software
- Use data loss prevention (DLP)
- Ensure strong password protection
Question: Which hardening endpoint category does boot management belong to?
- Endpoint monitoring
- Endpoint maintenance
- Local endpoint protection
- Administrative controls
Question: Which action can mitigate the exploitation of a computer using the administrator account reset procedure?
- Update security patches
- Change administrator passwords regularly
- Ensure the computer is physically secure
- Install antivirus software
Question: Which technique hardens endpoints as a part of endpoint maintenance?
- Data loss prevention (DLP)
- Automatic-updates and patching
- Startup hardening
- Boot management
Question: Which technology has caused the number of endpoints to multiply exponentially?
- Artificial intelligence (AI)
- Cloud services
- Internet of things (IoT)
- Virtualization
Question: Which two techniques harden endpoints using common administrative controls? (Choose two.)
- Backups
- User restrictions
- Policy checks
- Passwords
Question: Which technique allows you to recover content from a lost, stolen, damaged, or compromised device?
- Back up the data
- Install antivirus software
- Encrypt the disk
- Buy insurance