Q. Which hardening endpoint category does the principle of least privilege belong to?
Select one:
- Endpoint maintenance
- Administrative controls
- Endpoint monitoring
- Local endpoint protection
Q. Which technology has caused the number of endpoints to multiply exponentially?
Select one:
- Artificial intelligence (AI)
- Virtualization
- Internet of things (IoT)
- Cloud services
Q. Which technique hardens endpoints as a part of endpoint maintenance?
Select one:
- Data loss prevention (DLP)
- Boot management
- Automatic-updates and patching
- Startup hardening
Q Which technique allows you to recover content from a lost, stolen, damaged, or compromised device?
Select one:
- Buy insurance
- Encrypt the disk
- Back up the data
- Install antivirus software
Q. Which two techniques can prevent access to information on stolen portable devices? (Choose two.)
Select one or more:
- Install antivirus software
- Use data loss prevention (DLP)
- Encrypt the data stored on the device
- Ensure strong password protection
[FCF] Cybersecurity 2.0 - Lesson 08 : Endpoint Hardening Techniques(엔드포인트 강화 기술)
[FCF] Cybersecurity 2.0 - Lesson 08 : Endpoint Hardening Techniques(엔드포인트 강화 기술)
A. 엔드포인트 강화1. 개요사물 인터넷(IoT) 기기가 확산되면서 보안이 필요한 엔드포인트의 수가 기하급수적으로 늘어났습니다. 다행스럽게도 기존 클라이언트 및 서버 엔드포인트뿐만 아니라
infoofit.tistory.com
[FCF] Cybersecurity 2.0 - Lesson 09 : Endpoint Monitoring (Quesion&Answer)
[FCF] Cybersecurity 2.0 - Lesson 09 : Endpoint Monitoring (Quesion&Answer)
Q. Which platform can preemptively block new, undiscovered attacks? Select one: - Endpoint detection and response - Endpoint management system- Zero trust network access - Next generation firewall Q. Which feature is a function o
infoofit.tistory.com