In addition to existing, known threats, what other types of threats must modern endpoint solutions detect?
Select one:
Network latency or network traffic analysis
Wi-Fi interference
Hard drive crashes
*Unknown threats
Which method did early antivirus products use to detect malware?
Select one:
They searched for the word “virus” in the contents of the file.
They compared the name of the file with a list of known virus names.
*They compared the signature of the file with a list of known virus signatures.
They searched for the word “virus” in the file name.
What were early endpoint security products known as?
Select one:
Disk or Data recovery tools
Floppy disks
*Antivirus software
Sandboxes
How did the rise of the Internet affect the rate at which new malware variants appear?
Select one:
The rate increased slightly
The rate stayed the same
The rate decreased
*The rate increased tremendously
What must modern endpoint solutions do to be effective today?
Select one:
Block spam emails
*Go beyond simple signature comparisons
Block all network traffic
Block network connections that use the IPX protocol
Which device is not considered an endpoint device?
Select one:
*Ethernet switch
Laptop
Smartphone
IoT device
Why is the security of endpoint devices important? (Choose two.)
Select one or more:
Endpoints hold valuable data
Endpoints that are secured run faster
Endpoints can be a way to access other important data and devices on the network
Endpoints can run out of storage space otherwise
Endpoints use wireless connections
In addition to existing, known threats, what other types of threats must modern endpoint solutions detect? Select one: Network latency or network traffic analysis Wi-Fi interference Hard drive crashes *Unknown threats
Which method did early antivirus products use to detect malware?
Select one: They searched for the word “virus” in the contents of the file. They compared the name of the file with a list of known virus names. *They compared the signature of the file with a list of known virus signatures. They searched for the word “virus” in the file name.
What were early endpoint security products known as? Select one: Disk or Data recovery tools Floppy disks *Antivirus software Sandboxes
How did the rise of the Internet affect the rate at which new malware variants appear? Select one: The rate increased slightly The rate stayed the same The rate decreased *The rate increased tremendously
What must modern endpoint solutions do to be effective today? Select one: Block spam emails *Go beyond simple signature comparisons Block all network traffic Block network connections that use the IPX protocol
Which device is not considered an endpoint device? Select one: *Ethernet switch Laptop Smartphone IoT device
Why is the security of endpoint devices important? (Choose two.) Select one or more: Endpoints hold valuable data Endpoints that are secured run faster Endpoints can be a way to access other important data and devices on the network Endpoints can run out of storage space otherwise Endpoints use wireless connections