Endpoint Security

Target score: 8-9 out of 10

Estimated time: 10 minutes

Question 1 of 10

A hospital's IT department discovers that medical workstations deployed six months ago now have inconsistent security settings, with some having disabled firewalls and others running unauthorized software. The team needs to ensure all new deployments start from a standardized, secure state and prevent future deviations. What solution should they implement to establish consistent security configurations across all endpoints and prevent configuration drift?

Question 2 of 10

A financial analyst's laptop containing sensitive customer data is stolen from their vehicle during a business trip. The organization needs to ensure that even if the hard drive is removed and accessed externally, the data remains inaccessible to unauthorized users. Which security control should have been implemented?

Question 3 of 10

A manufacturing company's workstations are running outdated operating system versions with known vulnerabilities, but the IT team is hesitant to deploy updates during operational hours due to fear of disrupting critical processes. They need a systematic approach to handle updates that minimizes risk. What strategy should they implement to manage OS and application updates effectively?

Question 4 of 10

During a security audit of a corporate accounting department, assessors discover multiple unauthorized gaming applications, legacy browsers, and administrative tools installed on workstations. These applications have known vulnerabilities and create potential entry points for attackers. Which hardening practice should the organization enforce to minimize these risks?

Question 5 of 10

A company's traditional signature-based antivirus solution failed to detect a sophisticated ransomware attack that encrypted files across multiple endpoints. The security team needs a solution that detects threats in real-time. Which technology should they deploy to replace their legacy antivirus and provide automated response capabilities?

Question 6 of 10

An organization notices that its staff continue to download and install a popular game at work. Administrators block the web address where the game is available for download, but the company that produces the game changes the URL regularly. What is the BEST approach to prevent installation of this game?

Question 7 of 10

A cybersecurity team for a technology company specializes in developing mobile applications for various industries. The team is working on a new app that utilizes location services to provide users with real-time updates on nearby events and activities, based on their location. However, the project stakeholders have expressed concerns about certain aspects of location services. What is the PRIMARY concern surrounding location services in mobile devices?

Question 8 of 10

A contractor's compromised credentials are used to access sensitive databases at 3 AM from an unusual geographic location, downloading large amounts of data in patterns that differ significantly from the user's normal baseline. Traditional security tools show successful authentication and authorized access. Which technology would best identify this anomalous activity?

Question 9 of 10

A Windows enterprise environment needs to enforce strict security requirements including complex password policies, disabling USB storage devices, preventing installation of unauthorized software, and standardizing registry settings across thousands of domain-joined workstations. Which technology provides this centralized management and policy enforcement capability?

Question 10 of 10

A company wants to provide mobile devices to sales representatives who need to install personal applications for travel and entertainment, while ensuring IT can enforce encryption, remotely wipe only corporate data if the device is lost, and prevent backups to personal cloud accounts. Which deployment model and solution combination supports these requirements?