To enter this contest and have a chance to win a $50 Amazon.com gift card, reply to this post with your answers to the below questions;
1. What is the name of today’s most prolific Exploit Kit?
2. What is the purpose of an Exploit Kit?
3. What (3) main categories, covered in the webinar, make up Defense in Depth?
4. What Microsoft Knowledge Base ID is associated with preventing the WannaCrypt RansomWare vulnerability?
5. What database table does vulnerable definitions get stored in?
6. What are the three new options in Endpoint Security that enhance protection against malware?
7. What do you set up the rules to protect modification of .DOCX and .XLSX files?
8. Name 3 Community articles related to Endpoint Security.
9. What are the 3 Application Behavior and Whitelist modes?
10. What ports should be blocked to prevent SMB communication?