10.1.6 Check Your Understanding – Endpoint Security Answers

1. Which attack encrypts the data on hosts in an attempt to extract a monetary payment from the victim?

  • DDoS
  • Data breach
  • Malware
  • Ransomware

Explanation: Ransomware encrypts the data on a host and locks access to it until a ransom is paid.

2. Which devices are specifically designed for network security? (Choose three)

  • VPN-enabled router
  • NGFW
  • Switch
  • WLC
  • NAC

Explanation: A VPN-enabled router, NGFW, and NAC are network devices that are specifically designed for security. Although a switch and a WLC can be configured with security measures, they are access devices for endpoints.

3. Which device monitors SMTP traffic to block threats and encrypt outgoing messages to prevent data loss?

  • NGFW
  • ESA
  • NAC
  • WSA

Explanation: An ESA is specifically designed to monitor SMTP traffic.

4. Which device monitors HTTP traffic to block access to risky sites and encrypt outgoing messages?

  • NGFW
  • ESA
  • NAC
  • WSA

Explanation: A WSA is specifically designed to monitor HTTP traffic.

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x