Endpoint Quiz 1 of 2 https://training.fortinet.com/mod/quiz/review.php?attempt=1418... The Evolution of Cybersecurity
Views 201 Downloads 1 File size 307KB
Endpoint Quiz
1 of 2
https://training.fortinet.com/mod/quiz/review.php?attempt=1418...
The Evolution of Cybersecurity Started on State Completed on Time taken
Finished Thursday, July 11, 2019, 10:37 AM 12 mins 54 secs
Points
5/5
Grade
100 out of 100
Feedback
Question 1
Thursday, July 11, 2019, 10:24 AM
Congratulations, you have passed!
What method did the early antivirus products use to detect malware? (Choose one.)
Correct 1 points out of 1
Select one: Compare the signature of the file with a list of known virus signatures. Search for the word “virus” in the file name. Search for the word “virus” in the contents of the file. Compare the name of the file with a list of known virus names.
Question 2
Which one of the following is NOT considered an endpoint device? (Choose one.)
Correct 1 points out of 1
Select one: Ethernet switch IoT device Smartphone Laptop
Question 3
With the rise of the Internet, what happened to the rate that new malware variants appear? (Choose one.)
Correct 1 points out of 1
Select one: The rate decreased. The rate stayed the same. The rate increased slightly. The rate increased tremendously.
Question 4
Modern endpoint solutions must identify existing, known threats. What other type of threats must they detect? (Choose one.)
Correct 1 points out of 1
Select one: Unknown threats Wi-Fi interference Low battery power Hard drive crash
Question 5
What were the early forms of endpoint security products known as? (Choose one.)
Correct 1 points out of 1
Select one: AntiVirus software Disk-infectants
7/11/2019, 4:38 PM
Endpoint Quiz
2 of 2
https://training.fortinet.com/mod/quiz/review.php?attempt=1418...
7/11/2019, 4:38 PM