0% found this document useful (0 votes)
275 views2 pages

Quiz 4 - Nse 2 v2 Ok

This document summarizes the results of an endpoint security quiz taken on April 22, 2020. The quiz contained 5 multiple choice questions about how the rise of the internet affected malware, what modern endpoint solutions must do, examples of endpoint devices, why endpoint security is important, and what other types of threats modern solutions must detect. The user answered all questions correctly and received full points and a grade of 100%.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
275 views2 pages

Quiz 4 - Nse 2 v2 Ok

This document summarizes the results of an endpoint security quiz taken on April 22, 2020. The quiz contained 5 multiple choice questions about how the rise of the internet affected malware, what modern endpoint solutions must do, examples of endpoint devices, why endpoint security is important, and what other types of threats modern solutions must detect. The user answered all questions correctly and received full points and a grade of 100%.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

21/4/2020 Endpoint Quiz

 The Evolution of Cybersecurity

Started on Wednesday, April 22, 2020, 4:35 AM


State Finished
Completed on Wednesday, April 22, 2020, 4:37 AM
Time taken 2 mins 1 sec
Points 5/5
Grade 100 out of 100
Feedback Congratulations, you passed!

Question 1 How did the rise of the Internet affect the rate at which new malware variants appear?
Correct

1 points out of 1 Select one:


The rate increased slightly

The rate increased tremendously 

The rate stayed the same

The rate decreased

Question 2 What must modern endpoint solutions do to be effective today?


Correct

1 points out of 1 Select one:


Block spam emails

Go beyond simple signature comparisons 

Block network connections that use the IPX protocol

Block all network traffic

Question 3 Which device is not considered an endpoint device?


Correct

1 points out of 1 Select one:


IoT device

Smartphone

Ethernet switch 

Laptop

Question 4 Why is the security of endpoint devices important? (Choose two.)


Correct

1 points out of 1 Select one or more:


Endpoints hold valuable data 

Endpoints can run out of storage space otherwise

Endpoints can be a way to access other important data and devices on the network 

Endpoints use wireless connections

Endpoints that are secured run faster

https://training.fortinet.com/mod/quiz/review.php?attempt=3119089&cmid=53691 1/2
21/4/2020 Endpoint Quiz

Question 5 In addition to existing, known threats, what other types of threats must modern endpoint solutions detect?
Correct

1 points out of 1 Select one:


Hard drive crashes

Network latency or network traffic analysis

Wi-Fi interference

Unknown threats 

https://training.fortinet.com/mod/quiz/review.php?attempt=3119089&cmid=53691 2/2

You might also like