4.5 Endpoint Security Flashcards

(27 cards)

1
Q

What is the endpoint in a network?

A

The device used by the user, such as a desktop, laptop, or mobile device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can applications running on an endpoint be exploited for?

A

To gain access to the user’s data or other sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is required to identify malicious software?

A

Monitoring both inbound and outbound information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a layered approach to security involve?

A

Having different types of security solutions on all devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where is security typically first implemented in an organization?

A

At the edge of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the role of a firewall at the network edge?

A

To monitor all traffic going from the inside to the outside and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does access control describe?

A

The ability to limit a device’s access to a certain type of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name a parameter that can be used to create access control rules.

A
  • User name
  • User group
  • User location
  • Data location
  • Application type
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What can access control lists do?

A

They can be modified or removed at any time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a posture assessment?

A

A check to ensure that devices are up to date with the latest security technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When is a good time to perform a posture assessment?

A

When a device first connects to the network or logs in remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a trusted device identified by?

A

A company certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of full disk encryption?

A

To protect the storage of remote devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a persistent agent?

A

Software installed permanently on devices to monitor files and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a dissolvable agent?

A

Software that runs during login and removes itself after execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Agentless Network Access Control (NAC)?

A

An agent integrated with Active Directory that runs during login/logout.

17
Q

What options does a security administrator have if a device fails a posture assessment?

A
  • Quarantine the system
  • Put it on its own VLAN
  • Provide instructions for compliance
18
Q

How many virus variants are estimated to be created every day?

A

Over a million.

19
Q

What does EDR stand for?

A

Endpoint Detection and Response.

20
Q

What is the primary function of EDR?

A

To extend visibility into behavioral analysis and monitor processes.

21
Q

What additional capability does EDR provide compared to traditional antivirus?

A

Root-cause analysis.

22
Q

What is XDR?

A

Extended Detection and Response.

23
Q

What does XDR enhance in terms of security monitoring?

A

It provides additional intelligence and a larger scope of data input.

24
Q

What is the key benefit of using XDR?

A

To correlate data across multiple systems and improve threat detection.

25
What type of analytics does XDR use to establish a baseline of user behavior?
User-behavior analytics.
26
How does XDR identify abnormal events?
By comparing user activity against a set of rules configured in the software.
27
What is the ultimate goal of using XDR in network security?
To simplify the process of finding and stopping malicious code in real time.