0% found this document useful (0 votes)
732 views2 pages

Crackquiz: Security Incident Computer Security Incident Response Team

Incident response is an organized approach to addressing security breaches. The goal is to limit damage and reduce recovery time and costs. An organization's computer security incident response team follows an incident response plan which outlines how to respond to network events and security incidents. Endpoint security solutions provide centralized protection for networks and all endpoints from threats using security tools.

Uploaded by

sathish
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
732 views2 pages

Crackquiz: Security Incident Computer Security Incident Response Team

Incident response is an organized approach to addressing security breaches. The goal is to limit damage and reduce recovery time and costs. An organization's computer security incident response team follows an incident response plan which outlines how to respond to network events and security incidents. Endpoint security solutions provide centralized protection for networks and all endpoints from threats using security tools.

Uploaded by

sathish
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

CrackQuiz

crackquiz.com/question/category/endpoint-security

Incident response is an organized approach to addressing and managing the aftermath of a security
breach or cyberattack, also known as an IT incident, computer incident or security incident. The
goal is to handle the situation in a way that limits damage and reduces recovery time and
costs.Ideally, incident response activities are conducted by the organization's computer security
incident response team (CSIRT), a group that has been previously selected to include
informationsecurity and general IT staff as well as C-suite level members. The team may also
include representatives from the legal, human resources and public relations departments. The
incident response team follows the organization's incident response plan (IRP), which is a set of
written instructions that outline the organization's response to network events, security incidents
and confirmed breaches.

Which feature of anti-virus softwares removes or isolates potentially malicious files and
applications?File quarantine

Which of the following is a portable executable?potentially unwated program

Which among the following is most useful to protect complete networks?Endpoint Security

A centrally managed solution that protects networks and all their endpoints against threats with
the help of various security tools:endpoint security

What is the common name for remote computing devices that communicate back and forth with a
network to which they are connected?endpoints

A single program responsible for scanning, detecting, and removing malware, spyware, adware,
ransomware and other such malicious entities.Anti-virus

Which of the following feature of endpoint security solutions involves real timemonitoring of
network topology, connections, and traffic flow? Continous Detection

is the term that is used to refer to the method by which a malicious portable executable has
reached an endpoint. Chain of attack

is the term that is used to refer to the method by which a malicious portable executable has
reached an endpoint. True

which of the following is a portable executable? Weaponized documents

It is safest to test ransomware by using one-at-a-time approach. True


Testing can readily be done in production environment. False

----is the term that is used to refer to the method by which a malicious portable executable has
reached an endpoint. Attack Tr

Network security solutions cannot be used to identify attacks in progress. False

----is an organized approach to addressing and managing the aftermath of a security breach or
cyberattack. Incident Response

Endpoint security solutions provide a decentralized solution to protect endpoints. False

Testing can be done effectively only on a system connected to the internet. False

------- is a technique where attackers modify legitimate software to hide a malicious application.
code caves

Which among the following is more focused on securing networks? Network securing

Which of the following are essential features to ensure data security? All of these

Which of the following aspects help analyze the effectiveness of an endpoint security solution?
All of these

Which of the following approaches to testing is most appropriate when the results are expected
to be precise? One at a time

Which among the following usually refers to a cloud-based solution? Endpoint protection

------ is responsible for filtering the traffic flowing in and out of a network based on ‘a set of
security rules’. Firewall

You might also like