💻 Endpoint Protection & Detection - SCOR Practice Questions

Study Cisco Secure Endpoint (AMP), EDR, antimalware, host-based firewalls, and endpoint detection and response strategies.

9Questions Available
1Exam Domains

Practice Endpoint Protection Questions Now

Start a timed practice session focusing on Endpoint Protection & Detection topics from the SCOR question bank.

Start SCOR Practice Quiz →

SCOR Endpoint Protection Question Bank (9 Questions)

Browse all 9 practice questions covering Endpoint Protection & Detection for the SCOR certification exam. Each question includes the full answer and a detailed explanation to help you understand the concepts.

  1. Question 1Endpoint Protection and Detection

    Which Cisco Secure Endpoint feature creates custom lists of file hashes to always block or always allow specific files?

    ADevice trajectory
    BOutbreak Control (Simple/Advanced Custom Detections)
    CExploit Prevention
    DMalicious Activity Protection
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    Outbreak Control in Cisco Secure Endpoint allows administrators to create Simple Custom Detections (block specific SHA-256 hashes) and Advanced Custom Detections (custom signatures) to immediately block or allow specific files.

  2. Question 2Endpoint Protection and Detection

    What is the purpose of Cisco Secure Endpoint (formerly AMP for Endpoints)?

    AFile sharing
    BComprehensive endpoint protection with prevention, detection, response, and threat hunting capabilities using cloud-based intelligence
    CNetwork monitoring
    DApplication firewall
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    Cisco Secure Endpoint provides: malware prevention (signatures, ML), behavioral detection, exploit prevention, device control, vulnerability information, and orbital advanced search for threat hunting.

  3. Question 3Endpoint Protection and Detection

    Which Cisco AMP for Endpoints feature allows retrospective detection of files that were initially deemed clean but later identified as malicious?

    ASandboxing
    BRetrospective Security
    CExploit Prevention
    DDevice Flow Correlation
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    Retrospective Security in Cisco AMP continuously analyzes file dispositions. If a file previously classified as clean is later identified as malicious, AMP can retroactively alert, quarantine, or remediate affected endpoints.

  4. Question 4Endpoint Protection and Detection

    Which endpoint detection capability tracks the lineage of processes on a host to determine how malware was introduced and what actions it performed?

    AFile integrity monitoring
    BDevice trajectory
    CNetwork flow analysis
    DVulnerability assessment
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    Device trajectory in Cisco AMP for Endpoints provides a visual map of file activity on a specific endpoint, tracking process lineage, file movements, and network connections to show how malware was introduced and its subsequent actions.

  5. Question 5Endpoint Protection and Detection

    What is the purpose of retrospective security in Cisco Secure Endpoint?

    ABlock threats at the network perimeter
    BContinuously analyze files after they enter the environment to detect previously unknown threats
    CManage endpoint patches
    DControl application installations
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    Retrospective security continuously re-evaluates files as new threat intelligence becomes available, detecting and alerting on malware that was initially classified as clean when first seen.

  6. Question 6Endpoint Protection and Detection

    Which Cisco AMP feature allows security analysts to search for specific indicators of compromise (IoCs) across all endpoints in the organization?

    AFile trajectory
    BOrbital Advanced Search
    COutbreak Control
    DExploit Prevention
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    Orbital Advanced Search in Cisco AMP enables security analysts to run complex queries across all managed endpoints to hunt for specific IoCs, investigate suspicious activities, and gather forensic data in real time.

  7. Question 7Endpoint Protection and Detection

    Which Cisco solution provides advanced endpoint protection with malware detection, EDR, and threat hunting capabilities?

    ACisco Umbrella
    BCisco Secure Endpoint (AMP for Endpoints)
    CCisco ISE
    DCisco Duo
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    Cisco Secure Endpoint (formerly AMP for Endpoints) provides endpoint detection and response (EDR), continuous monitoring, retrospective analysis, and threat hunting across endpoints.

  8. Question 8Endpoint Protection and Detection

    What is Cisco AMP for Endpoints?

    AAntivirus only
    BAdvanced malware protection providing continuous analysis, retrospective security, and threat hunting for endpoints
    CA firewall
    DA VPN client
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    AMP for Endpoints provides prevention, detection, and response capabilities: file reputation, sandboxing, behavioral analysis, retrospective alerts when files are later found malicious, and threat hunting.

  9. Question 9Endpoint Protection and Detection

    What is EDR (Endpoint Detection and Response)?

    AAntivirus updates
    BSecurity solution that continuously monitors endpoints to detect, investigate, and respond to threats with forensic data collection
    CEmail filtering
    DDNS protection
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    EDR provides continuous endpoint monitoring, threat detection using behavioral analysis, automated response actions, and forensic data for investigation and threat hunting.

Key Endpoint Protection Concepts for SCOR

ampedrendpointantimalwaresecure endpointmalware defense

SCOR Endpoint Protection Exam Tips

Endpoint Protection & Detection questions in SCOR are typically scenario-based. Focus on service-level decision making aligned to official exam objectives. Priority concepts: amp, edr, endpoint, antimalware, secure endpoint, malware defense.

What SCOR Expects

  • Anchor your answer in select the most practical, secure, and scalable answer for the stated scenario.
  • Endpoint Protection scenarios for SCOR are frequently mapped to Domain 5 (10%), so read the objective carefully before picking controls or architecture.
  • Expect multi-service scenarios where Endpoint Protection interacts with IAM, networking, storage, or observability patterns rather than appearing as an isolated service question.
  • When two options are both technically valid, prefer the choice that best aligns with the exam's operational scope (Professional) and managed-service best practices.

High-Value Endpoint Protection Concepts

  • Know the core Endpoint Protection building blocks cold: amp, edr, endpoint, antimalware.
  • Review the edge-case features and limits for secure endpoint, malware defense; these details are commonly used to differentiate answer choices.
  • Practice service-integration reasoning: how Endpoint Protection pairs with Security Concepts, Secure Network Access in real deployment patterns.
  • For SCOR, explain why the chosen Endpoint Protection design meets reliability, security, and cost expectations better than the alternatives.

Common SCOR Traps

  • Watch for answers that partially solve the requirement but miss operational constraints.
  • Questions in Endpoint Protection and Detection often include distractors that look correct for Endpoint Protection but violate least-privilege, durability, or availability requirements.
  • Avoid picking options purely by feature name; validate data path, failure handling, and governance impact before answering.
  • If the prompt hints at automation or repeatability, eliminate manual-only operational answers first.

Fast Review Checklist

  • Can you compare at least two Endpoint Protection implementation paths and justify which one best fits the scenario?
  • Can you map the chosen answer back to Endpoint Protection and Detection (10%) outcomes for SCOR?
  • Can you explain security and access boundaries for Endpoint Protection without relying on default-open assumptions?
  • Can you describe how Endpoint Protection integrates with Security Concepts and Secure Network Access during failure, scaling, and monitoring events?

Exam Domains Covering Endpoint Protection

Related Resources

More SCOR Study Resources