1.
Which type of product should a company use to identify installed software to determine licensing compliance?
2.
What is the primary benefit of hard drive encryption?
3.
Which malware identification technique blocks all applications and processes from running, unless they are legitimate and appropriate software as determined by a security policy?
4.
Which challenge does security information and event management (SIEM) help solve for customers?
5.
What is the ultimate enforcement level for information protection?
6.
What is the primary goal when creating a security policy?
7.
Which endpoint protection strategy uses system-level control of applications, processes, and hardware devices to prevent inappropriate software from running on a system?
8.
An end-user has mistakenly copied sensitive data into an email and attempted to send it outside the company. The email is quarantined, and the user's immediate manager receives a notification detailing the policy violation. An additional notification is sent to IT Security, and an investigation is initiated. What does this scenario describe?
9.
What is the primary benefit of network intrusion prevention on the host?
10.
What are the benefits of log management?