If you got two or more wrong, revisit these materials in the endpoint security lesson:
Webcast: Top tactics for endpoint security
Technical article: Keeping pace with emerging endpoint security technologies
Podcast: Endpoint enforcement: Smart policies to control the endpoint explosion
If you got four or more correct, return to Identity and Access Management Security School and start another lesson.
Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
This was first published in July 2006