Quiz - Endpoint Security - Attempt Review
Quiz - Endpoint Security - Attempt Review
Quiz - Endpoint Security - Attempt Review
Question 1
Correct
1 points out of 1
What should you always do before allowing IoT and BYOD endpoints to connect to a secure network?
Select one:
Deny access to the secure network until the device is identified.
Allow the device access to all networks to make it easier to integrate.
Connect the device to the internal network to allow administrators to log in.
Disable remote access to the device.
Question 2
Correct
1 points out of 1
Select one:
Purchase only approved laptops and servers.
Segment all IoT devices on an isolated network.
Identify new and existing endpoints in your network.
Register IoT devices in a database.
https://training.fortinet.com/mod/quiz/review.php?attempt=19466670&cmid=485425 1/2
6/7/24, 13:56 Quiz - Endpoint Security: Attempt review
Question 3
Partially correct
1 points out of 1
What are the two most common communication protocols used by IoT devices? (Choose two.)
Question 4
Correct
1 points out of 1
Select one:
Database server
Company laptop computer
Wi-Fi Baby Monitor
Printer connected to a laptop through USB
Question 5
Correct
1 points out of 1
Select one:
BIOS secured with a password
Web filtering
Endpoint detection and response (EDR)
Data loss prevention (DLP)
https://training.fortinet.com/mod/quiz/review.php?attempt=19466670&cmid=485425 2/2