Fortinet Getting Started in Cybersecurity Endpoint Hardening Techniques Quiz Answers

Lesson 08: Endpoint Hardening Techniques Quiz Answers

Question: Which hardening endpoint category does the principle of least privilege belong to?

  • Endpoint monitoring
  • Administrative controls
  • Endpoint maintenance
  • Local endpoint protection

Question: Which two techniques can prevent access to information on stolen portable devices? (Choose two.)

  • Encrypt the data stored on the device
  • Install antivirus software
  • Use data loss prevention (DLP)
  • Ensure strong password protection

Question: Which hardening endpoint category does boot management belong to?

  • Endpoint monitoring
  • Endpoint maintenance
  • Local endpoint protection
  • Administrative controls

Question: Which action can mitigate the exploitation of a computer using the administrator account reset procedure?

  • Update security patches
  • Change administrator passwords regularly
  • Ensure the computer is physically secure
  • Install antivirus software

Question: Which technique hardens endpoints as a part of endpoint maintenance?

  • Data loss prevention (DLP)
  • Automatic-updates and patching
  • Startup hardening
  • Boot management

Question: Which technology has caused the number of endpoints to multiply exponentially?

  • Artificial intelligence (AI)
  • Cloud services
  • Internet of things (IoT)
  • Virtualization

Question: Which two techniques harden endpoints using common administrative controls? (Choose two.)

  • Backups
  • User restrictions
  • Policy checks
  • Passwords

Question: Which technique allows you to recover content from a lost, stolen, damaged, or compromised device?

  • Back up the data
  • Install antivirus software
  • Encrypt the disk
  • Buy insurance

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.