Endpoint Security & BYOD Policies
Rating
0
0
There are no comments for now.
Join this Course
to be the first to leave a comment.
1.
Why are endpoints considered a major security risk?
2.
Which of the following BEST aligns with secure BYOD practices?
3.
Why is patch management important?
4.
A consultant connects an unknown USB device found in a meeting room to a company laptop “to identify the owner”. Why is this risky?
5.
Which of the following is a secure remote working practice?
6.
Why should employees report lost or stolen devices immediately?
7.
Which action BEST protects sensitive information stored on endpoints?
8.
Which of the following is an example of shadow IT?
9.
Why are mobile devices considered high-risk endpoints?
10.
What should employees do if malware is suspected on a device?
11.
Which of the following BEST demonstrates poor endpoint security practice?
12.
Why is device encryption important?
13.
Which statement about endpoint monitoring is MOST accurate?
14.
Which of the following presents the GREATEST endpoint risk?
15.
What is the BEST response to repeated unexpected MFA prompts on a company-managed device?
16.
Why should employees avoid downloading software from untrusted sources?
17.
Which statement about BYOD usage is MOST accurate?
18.
Which of the following should ALWAYS be reported?
19.
What is the BEST overall approach to endpoint security?
20.
Which behaviour BEST supports secure endpoint management?