Login
Remember
Register
Q&A
Questions
Ask a Question
Recent questions tagged #endpoint
Home
>
Recent questions tagged #endpoint
0
votes
1
answer
________ is a technique where attackers modify legitimate software to hide a malicious application.
asked
Oct 25, 2020
in
Technology
by
JackTerrance
(
1.7m
points)
interview-question-answer
technology-questions-answers
0
votes
2
answers
__________ provides a snapshot of threats over time, encouraging the maintenance of up-to-date situational awareness.
asked
Oct 25, 2020
in
Technology
by
JackTerrance
(
1.7m
points)
interview-question-answer
technology-questions-answers
0
votes
1
answer
________ is the term that is used to refer to the method by which a malicious portable executable has reached an endpoint.
asked
Oct 25, 2020
in
Technology
by
JackTerrance
(
1.7m
points)
interview-question-answer
technology-questions-answers
0
votes
1
answer
Which of the following approaches to testing is most appropriate when the results are expected to be precise?
asked
Oct 25, 2020
in
Technology
by
JackTerrance
(
1.7m
points)
interview-question-answer
technology-questions-answers
0
votes
2
answers
Testing can be done effectively only on a system connected to the internet.
asked
Oct 25, 2020
in
Technology
by
JackTerrance
(
1.7m
points)
interview-question-answer
technology-questions-answers
0
votes
1
answer
Which of the following is a portable executable?
asked
Oct 25, 2020
in
Technology
by
JackTerrance
(
1.7m
points)
interview-question-answer
technology-questions-answers
0
votes
1
answer
_______ is responsible for filtering the traffic flowing in and out of a network based on ‘a set of security rules’.
asked
Oct 25, 2020
by
JackTerrance
(
1.7m
points)
#endpoint
0
votes
1
answer
Which of the following feature of endpoint security solutions involves real time monitoring of network topology, connections, and traffic flow?
asked
Oct 25, 2020
in
Technology
by
JackTerrance
(
1.7m
points)
interview-question-answer
technology-questions-answers
0
votes
1
answer
Which among the following is more focused on securing networks?
asked
Oct 25, 2020
in
Technology
by
JackTerrance
(
1.7m
points)
interview-question-answer
technology-questions-answers
0
votes
1
answer
Testing can readily be done in production environment.
asked
Oct 25, 2020
in
Technology
by
JackTerrance
(
1.7m
points)
interview-question-answer
technology-questions-answers
0
votes
1
answer
Privilege escalation is an _______________.
asked
Oct 25, 2020
in
Technology
by
JackTerrance
(
1.7m
points)
interview-question-answer
technology-questions-answers
0
votes
1
answer
their computer comes under __________.
asked
Oct 25, 2020
in
Technology
by
JackTerrance
(
1.7m
points)
interview-question-answer
technology-questions-answers
0
votes
1
answer
_________ is an organized approach to addressing and managing the aftermath of a security breach or cyberattack.
asked
Oct 25, 2020
in
Technology
by
JackTerrance
(
1.7m
points)
interview-question-answer
technology-questions-answers
0
votes
1
answer
It is safest to test ransomware by using one-at-a-time approach.
asked
Oct 25, 2020
in
Technology
by
JackTerrance
(
1.7m
points)
interview-question-answer
technology-questions-answers
0
votes
0
answers
Endpoint security solutions provide a decentralized solution to protect endpoints.
asked
Oct 24, 2020
by
JackTerrance
(
1.7m
points)
#endpoint
0
votes
1
answer
What all are Advanced Endpoint Protection Products?
asked
Oct 24, 2020
in
Technology
by
JackTerrance
(
1.7m
points)
interview-question-answer
technology-questions-answers
0
votes
1
answer
What are the most common endpoint threats and attack technique?
asked
Oct 24, 2020
in
Technology
by
JackTerrance
(
1.7m
points)
interview-question-answer
technology-questions-answers
0
votes
1
answer
What is The Essence of Endpoint Security Testing?
asked
Oct 24, 2020
in
Technology
by
JackTerrance
(
1.7m
points)
interview-question-answer
technology-questions-answers
0
votes
1
answer
Endpoints security solutions leverage a _____________ model for protecting various endpoints.
asked
Oct 24, 2020
in
Technology
by
JackTerrance
(
1.7m
points)
interview-question-answer
technology-questions-answers
0
votes
1
answer
Which among the following is most useful to protect complete networks?
asked
Oct 24, 2020
in
Technology
by
JackTerrance
(
1.7m
points)
interview-question-answer
technology-questions-answers
Page:
1
2
next »
...