---Advertisement---
Digital Security

Endpoint Security Interview Question-Answer

By Smart Answer

Updated on:

---Advertisement---

Q.1 A centrally managed solution that protects networks and all their endpoints against threats with the help of various security tools:

       A. Endpoint Security

       B. Endpoint Protection

       C. Antivirus

       D. Network Security

Ans : Endpoint Security


Q.2 Endpoints security solutions leverage a _____________ model for protecting various endpoints.

       A. Peer-to-peer

       B. Client/server

       C. Non-interference model

Ans : Client/server


Q.3 Which among the following is most useful to protect complete networks?

       A. Endpoint Security

       B. Antivirus

Ans : Endpoint Security


Q.4 Which among the following usually refers to an on-premise solution?

       A. Endpoint Protection

       B. Endpoint Security

Ans : Endpoint Security


Q.5 A single program responsible for scanning, detecting, and removing malware, spyware, adware, ransomware and other such malicious entities.

       A. IPS

       B. Firewall

       C. Vulnerability Scanner

       D. Anti-virus

       E. IDS

Ans : Anti-virus


Q.6 _________ is an organized approach to addressing and managing the aftermath of a security breach or cyberattack.

       A. Incident Response

       B. Continous Detection

       C. Incident remediation

       D. Incident investigation

Ans : Incident Response


Q.7 Privilege escalation is an _______________.

       A. Exploit

       B. false positive

       C. Passive attack

       D. Active attack

Ans : Exploit


Q.8 ________ is the term that is used to refer to the method by which a malicious portable executable has reached an endpoint.

       A. Chain of attack

       B. Attack Strategy

       C. Line of attack

       D. Attack Trajectory

Ans : Attack Trajectory


Q.9 It is safest to test ransomware by using one-at-a-time approach.

       A. True

       B. False

Ans : True


Q.10 Network security solutions cannot be used to identify attacks in progress.

       A. True

       B. False

Ans : False


Q.11 Endpoint security solutions provide a decentralized solution to protect endpoints.

       A. True

       B. False

Ans : False


Q.12 Preventing users from accessing known dangerous locations on the internet, plugging in uncontrolled devices to their computer comes under __________.

       A. Attack Remediation

       B. preventing the exploitation of known and unknown vulnerabilities

       C. Attack surface reduction

       D. Detection and prevention of deployment of malicious exploitables

Ans : Attack surface reduction


Q.13 Which feature of anti-virus softwares removes or isolates potentially malicious files and applications?

       A. Web protection

       B. Real time scanning

       C. File quarantine

       D. Threat identification

Ans : File quarantine


Q.14 ________ is a technique where attackers modify legitimate software to hide a malicious application.

       A. Code caves

       B. Exploits

       C. Weaponized documents

       D. Wipers

Ans : Code caves


Q.15 __________ provides a snapshot of threats over time, encouraging the maintenance of up-to-date situational awareness.

       A. Network monitoring

       B. Endpoint activity monitoring

       C. Threat analysis

       D. Vulnerability Scanning

Ans : Endpoint activity monitoring


Q.16 Which among the following is more focused on securing networks?

       A. Anti-virus

       B. Firewall

       C. Network Security

       D. Endpoint Security

Ans : Endpoint Security


Q.17 Which of the following aspects help analyze the effectiveness of an endpoint security solution?

       A. Flexibility

       B. Performance of intended functions

       C. Inherent Persistence

       D. All of these

Ans : All of these


Q.18 Which of the following feature of endpoint security solutions involves real time monitoring of network topology, connections, and traffic flow?

       A. Centralized Security Management

       B. Mobile Threat Management

       C. Continous Detection

       D. All of these

Ans : Continous Detection


Q.19 _______ is responsible for filtering the traffic flowing in and out of a network based on ‘a set of security rules’.

       A. Intrusion Detection Systems

       B. Anti-malware

       C. Anti-virus

       D. Firewall

Ans : Intrusion Detection Systems


Q.20 Which of the following are essential features to ensure data security?

       A. Network segregation

       B. Data Encryption

       C. Data loss prevention

       D. Data access monitoring

       E. All of these

Ans : All of these


Q.21 Which of the following approaches to testing is most appropriate when the results are expected to be precise?

       A. One at a time

       B. Many at a time

Ans : Many at a time


Q.22 Testing can be done effectively only on a system connected to the internet.

       A. True

       B. False

Ans : True


Q.23 Testing can readily be done in production environment.

       A. True

       B. False

Ans : False


Smart Answer

---Advertisement---

Related Post

Cyber Security Interview Question-Answer Part – 3

Cybersecurity Prologue Interview Question-Answer Cyber Security Interview Question-Answer Part – 1 Cyber Security Interview Question-Answer Part – 2 Q.1 Which of the following can also consider as the ...

Cyber Security Interview Question-Answer Part – 2

Cybersecurity Prologue Interview Question-Answer Cyber Security Interview Question- – 1 Cyber Security Interview Question- – 3 Q.1 Which of the following can be considered as the elements of ...

Cyber Security Interview Question-Answer

Cybersecurity Prologue Interview Question-Answer Cyber Security Interview Question-Answer Part – 2 Cyber Security Interview Question-Answer Part – 3 Q.1 Which of the following refers to stealing one’s idea ...

User Authentication Interview Question-Answer part – 2

Authentication Interview Question-Answer Q.1 Which of the following is a good practice?        A. Give full permission for remote transferring        B. Grant read ...

Leave a Comment