
SYO 701 EDR Module FC
Flashcard
•
Computers
•
University
•
Practice Problem
•
Hard
Oak Academy
FREE Resource
Student preview

24 questions
Show all answers
1.
FLASHCARD QUESTION
Front
60. A recent malware outbreak across a subnet included successful rootkit installations on many PCs, ensuring persistence by rendering remediation efforts ineffective. Which of the following would best detect the presence of a rootkit in the future?
Back
C. EDR
2.
FLASHCARD QUESTION
Front
98. A systems administrator receives the following alert from a file integrity monitoring tool:
The hash of the cmd.exe file has changed.
The systems administrator checks the OS logs and notices that no patches were applied in the last two months.
Which of the following most likely occurred?
Back
D. A rootkit was deployed.
3.
FLASHCARD QUESTION
Front
106. A security analyst and the management team are reviewing the organizational performance of a recent phishing campaign. The user click-through rate exceeded the acceptable risk threshold, and the management team wants to reduce the impact when a user clicks on a link in a phishing message. Which of the following should the analyst do?
Back
C. Update the EDR policies to block automatic execution of downloaded programs.
4.
FLASHCARD QUESTION
Front
114. A security administrator needs a method to secure data in an environment that includes some form of checks so that the administrator can track any changes. Which of the following should the administrator set up to achieve this goal?
Back
D. FIM
5.
FLASHCARD QUESTION
Front
116. Which of the following can best protect against an employee inadvertently installing malware on a company system?
Back
D. Application allow list
6.
FLASHCARD QUESTION
Front
136. Which of the following is used to protect a computer from viruses, malware, and Trojans being installed and moving laterally across the network?
Back
C. EDR
7.
FLASHCARD QUESTION
Front
163. Which of the following actions could a security engineer take to ensure workstations and servers are properly monitored for unauthorized changes and software?
Back
D. Install endpoint management software on all systems.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?