Q. Which hardening endpoint category does the principle of least privilege belong to?
Select one:
- Endpoint maintenance
- Administrative controls
- Endpoint monitoring
- Local endpoint protection
Q. Which technology has caused the number of endpoints to multiply exponentially?
Select one:
- Artificial intelligence (AI)
- Virtualization
- Internet of things (IoT)
- Cloud services
Q. Which technique hardens endpoints as a part of endpoint maintenance?
Select one:
- Data loss prevention (DLP)
- Boot management
- Automatic-updates and patching
- Startup hardening
Q Which technique allows you to recover content from a lost, stolen, damaged, or compromised device?
Select one:
- Buy insurance
- Encrypt the disk
- Back up the data
- Install antivirus software
Q. Which two techniques can prevent access to information on stolen portable devices? (Choose two.)
Select one or more:
- Install antivirus software
- Use data loss prevention (DLP)
- Encrypt the data stored on the device
- Ensure strong password protection
[FCF] Cybersecurity 2.0 - Lesson 08 : Endpoint Hardening Techniques(엔드포인트 강화 기술)
[FCF] Cybersecurity 2.0 - Lesson 09 : Endpoint Monitoring (Quesion&Answer)