[Certification]/[FCF] Fortinet Certified Fundamentals

[FCF] Cybersecurity 2.0 - Lesson 09 : Endpoint Monitoring (Quesion&Answer)

starterr 2024. 5. 19. 15:32
반응형

Q. Which platform can preemptively block new, undiscovered attacks?
Select one:

- Endpoint detection and response
- Endpoint management system
- Zero trust network access
- Next generation firewall


Q. Which feature is a function of both EPP and EDR?
Select one:

- Administrative top-down visibility
- Enforcement of security policies
- Data loss prevention
- Antivirus scanning


Q. Which two elements are a part of the endpoint monitoring category? (Choose two.)
Select one or more:

- Intrusion detection systems (IDS)
- Endpoint auditing
- Endpoint protection platform (EPP)
- Data loss prevention (DLP)


Q. Which feature is a function of endpoint detection and response (EDP)?
Select one:

- Predicts malware using large databases of known attacks
- Enforces strong passwords
- Enforces security policies
- Data loss prevention

 

반응형



Q. Which three strategies help secure unknown endpoints? (Choose three.)
Select one or more:

- Migrate network assets from a local physical network to the cloud
- Configure network security devices to prevent unauthorized devices from accessing the network
- Force devices onto an isolated network until they are secured and registered
- Upgrade antivirus software on all known network devices
- Enforce the principle of least privilege

Q. Which two features are functions of an endpoint protection platform (EPP)? (Choose two.)
Select one or more:

- Predicts malware using large databases of known attacks
- Verifies versions of software and firmware
- Enforces security policies
- Updates a malware detection rule based on a CVE alert

 

 

[FCF] Cybersecurity 2.0 - Lesson 08 : Endpoint Hardening Techniques (Quesion&Answer)

 

[FCF] Cybersecurity 2.0 - Lesson 08 : Endpoint Hardening Techniques (Quesion&Answer)

Q. Which hardening endpoint category does the principle of least privilege belong to? Select one: - Endpoint maintenance - Administrative controls- Endpoint monitoring - Local endpoint protection Q. Which technology has caused the

infoofit.tistory.com

 

[FCF] Cybersecurity 2.0 - Lesson 07 : Wi-Fi (Quesion&Answer)

 

[FCF] Cybersecurity 2.0 - Lesson 07 : Wi-Fi (Quesion&Answer)

Q. Which two features of Wi-Fi Protected Access 3 (WPA3) strengthened security? (Choose two.) Select one or more: - The handshake for establishing connections became more secure.- Complex passphrases were enforced. - The encryption 

infoofit.tistory.com

 

반응형