SYO 701 EDR Module FC

SYO 701 EDR Module FC

Assessment

Flashcard

Computers

University

Hard

Created by

Oak Academy

FREE Resource

Student preview

quiz-placeholder

24 questions

Show all answers

1.

FLASHCARD QUESTION

Front

60. A recent malware outbreak across a subnet included successful rootkit installations on many PCs, ensuring persistence by rendering remediation efforts ineffective. Which of the following would best detect the presence of a rootkit in the future?

Back

C. EDR

2.

FLASHCARD QUESTION

Front

98. A systems administrator receives the following alert from a file integrity monitoring tool:

  • The hash of the cmd.exe file has changed.

  • The systems administrator checks the OS logs and notices that no patches were applied in the last two months.

  • Which of the following most likely occurred?

Back

D. A rootkit was deployed.

3.

FLASHCARD QUESTION

Front

106. A security analyst and the management team are reviewing the organizational performance of a recent phishing campaign. The user click-through rate exceeded the acceptable risk threshold, and the management team wants to reduce the impact when a user clicks on a link in a phishing message. Which of the following should the analyst do?

Back

C. Update the EDR policies to block automatic execution of downloaded programs.

4.

FLASHCARD QUESTION

Front

  1. 114. A security administrator needs a method to secure data in an environment that includes some form of checks so that the administrator can track any changes. Which of the following should the administrator set up to achieve this goal?

Back

D. FIM

5.

FLASHCARD QUESTION

Front

116. Which of the following can best protect against an employee inadvertently installing malware on a company system?

Back

D. Application allow list

6.

FLASHCARD QUESTION

Front

136. Which of the following is used to protect a computer from viruses, malware, and Trojans being installed and moving laterally across the network?

Back

C. EDR

7.

FLASHCARD QUESTION

Front

163. Which of the following actions could a security engineer take to ensure workstations and servers are properly monitored for unauthorized changes and software?

Back

D. Install endpoint management software on all systems.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?