Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following aspects help analyze the effectiveness of an endpoint security solution?

Answer»

Which of the following ASPECTS help analyze the effectiveness of an endpoint security solution?
Choose the CORRECT option from below LIST
(1)Flexibility
(2)Inherent Persistence
(3)All of these
(4)PERFORMANCE of INTENDED functions

Answer:-(3)All of these

2.

A centrally managed solution that protects networks and all their endpoints against threats with the help of various security tools

Answer»

A centrally managed SOLUTION that protects NETWORKS and all their endpoints against THREATS with the help of various SECURITY tools
Choose the correct option from below list
(1)Antivirus
(2)Endpoint Security
(3)Endpoint Protection
(4)Network Security

Answer:-(2)Endpoint Security

3.

Which of the following approaches to testing is most appropriate when the results are expected to be precise?

Answer»

Which of the FOLLOWING approaches to testing is most appropriate when the results are expected to be precise?
Choose the CORRECT option from below LIST
(1)MANY at a time
(2)One at a time

Answer:-(2)One at a time

4.

Endpoint security solutions provide a decentralized solution to protect endpoints.

Answer»

Endpoint security SOLUTIONS provide a decentralized solution to protect endpoints.
Choose the correct option from below LIST
(1)True
(2)False

Answer:-(2)False

5.

Which of the following is a portable executable?

Answer»

Which of the following is a portable executable?
CHOOSE the correct option from below list
(1)Disk encryptors and wipers
(2)POTENTIALLY Unwanted Program
(3)Code CAVES
(4)Weaponized documents

Answer:-(2)Potentially Unwanted Program

6.

_________ is an organized approach to addressing and managing the aftermath of a security breach or cyberattack.

Answer»

_________ is an organized approach to ADDRESSING and managing the aftermath of a SECURITY breach or cyberattack.
Choose the correct option from below list
(1)Incident REMEDIATION
(2)Incident Response
(3)Continous Detection
(4)Incident investigation

Answer:-(2)Incident Response

7.

Which feature of anti-virus softwares removes or isolates potentially malicious files and applications?

Answer»

Which feature of anti VIRUS softwares removes or isolates potentially malicious files and applications?
Choose the CORRECT option from below list
(1)Web protection
(2)File quarantine
(3)Threat identification
(4)Real time scanning

Answer:-(2)File quarantine

8.

It is safest to test ransomware by using one-at-a-time approach.

Answer»

It is safest to test RANSOMWARE by USING one at a time approach.
Choose the correct OPTION from below list
(1)True
(2)False

Answer:-(1)True

9.

Which among the following is more focused on securing networks?

Answer»

Which among the FOLLOWING is more focused on securing networks?
CHOOSE the correct OPTION from below list
(1)Endpoint Security
(2)NETWORK Security
(3)Firewall
(4)Anti-virus

Answer:-(2)Network Security

10.

________ is a technique where attackers modify legitimate software to hide a malicious application.

Answer»

________ is a technique where attackers MODIFY legitimate software to hide a malicious application.
Choose the CORRECT OPTION from below list
(1)Wipers
(2)Weaponized documents
(3)Code caves
(4)Exploits

Answer:-(3)Code caves

11.

Which among the following usually refers to a cloud-based solution?

Answer»

Which among the following USUALLY refers to a cloud-based solution?
CHOOSE the CORRECT option from below list
(1)Endpoint Protection
(2)Endpoint Security

Answer:-(1)Endpoint Protection

12.

Preventing users from accessing known dangerous locations on the internet, plugging in uncontrolled devices to their computer comes under __________.

Answer»

Preventing users from accessing known dangerous locations on the internet, plugging in uncontrolled devices to their computer comes under __________.
CHOOSE the correct option from below LIST
(1)Detection and PREVENTION of deployment of (2)malicious exploitables
(3)preventing the EXPLOITATION of known and unknown vulnerabilities
(4)Attack surface REDUCTION
(5)Attack Remediation

Answer:-(4)Attack surface reduction

13.

Which of the following are essential features to ensure data security?

Answer»

Which of the FOLLOWING are ESSENTIAL features to ensure DATA security?
Choose the correct option from below list
(1)All of these
(2)Data Encryption
(3)Data access monitoring
(4)Data LOSS PREVENTION
(5)Network segregation

Answer:-(1)All of these

14.

_______ is responsible for filtering the traffic flowing in and out of a network based on a set of security rules .

Answer»

_______ is RESPONSIBLE for FILTERING the traffic FLOWING in and out of a NETWORK based on "a set of security rules".
CHOOSE the correct option from below list
(1)Anti-malware
(2)Firewall
(3)Anti-virus
(4)Intrusion Detection Systems

Answer:-(2)Firewall

15.

Network security solutions cannot be used to identify attacks in progress.

Answer» NETWORK security SOLUTIONS cannot be used to identify ATTACKS in progress.
Choose the correct option from below list
(1)True
(2)False

Answer:-(2)False
16.

__________ provides a snapshot of threats over time, encouraging the maintenance of up-to-date situational awareness.

Answer»

__________ provides a snapshot of threats over time, encouraging the maintenance of up to date situational awareness.
Choose the correct option from below list
(1)Vulnerability Scanning
(2)NETWORK monitoring
(3)Threat ANALYSIS
(4)Endpoint activity monitoring

Answer:-(2)Network monitoring

17.

________ is the term that is used to refer to the method by which a malicious portable executable has reached an endpoint.

Answer»

________ is the TERM that is used to REFER to the method by which a malicious portable executable has reached an endpoint.
Choose the CORRECT option from below list
(1)Attack STRATEGY
(2)Chain of attack
(3)Attack TRAJECTORY
(4)Line of attack

Answer:-(2)Chain of attack

18.

Endpoints security solutions leverage a _____________ model for protecting various endpoints.

Answer»

Endpoints SECURITY solutions leverage a _____________ model for PROTECTING VARIOUS endpoints.
Choose the correct option from below list
(1)Non-interference model
(2)Client/server
(3)Peer-to-peer

Answer:-(2)Client/server

19.

Which among the following usually refers to an on-premise solution?

Answer»

Which AMONG the following usually refers to an on-premise SOLUTION?
Choose the correct OPTION from below list
(1)Endpoint Security
(2)Endpoint Protection

Answer:-(1)Endpoint Security

20.

What is the common name for remote computing devices that communicate back and forth with a network to which they are connected?

Answer»

What is the COMMON name for remote computing devices that communicate back and forth with a network to which they are connected?
Choose the correct option from below LIST
(1)TERMINALS
(2)Endpoints
(3)Workstations
(4)Mobile Devices

Answer:-(2)Endpoints

21.

Privilege escalation is an _______________.

Answer»

Privilege escalation is an _______________.
Choose the correct OPTION from below list
(1)EXPLOIT
(2)Passive ATTACK
(3)ACTIVE attack
(4)false positive

Answer:-(3)Active attack

22.

Which of the following feature of endpoint security solutions involves real time monitoring of network topology, connections, and traffic flow?

Answer»

Which of the following feature of endpoint security solutions involves real time monitoring of network topology, connections, and TRAFFIC FLOW?
Choose the correct option from below list
(1)Continous Detection
(2)Mobile THREAT Management
(3)All of these
(4)Centralized Security Management

Answer:-(1)Continous Detection

23.

Which among the following is most useful to protect complete networks?

Answer»

Which among the following is most useful to PROTECT complete NETWORKS?
Choose the correct option from below LIST
(1)Endpoint Security
(2)Antivirus

Answer:-(1)Endpoint Security

24.

A single program responsible for scanning, detecting, and removing malware, spyware, adware, ransomware and other such malicious entities.

Answer»

A single program RESPONSIBLE for scanning, detecting, and removing malware, SPYWARE, adware, RANSOMWARE and other such malicious entities.
Choose the correct OPTION from below list
(1)IPS
(2)Anti-virus
(3)Vulnerability Scanner
(4)FIREWALL
(5)IDS

Answer:-(2)Anti-virus