Search Header Logo

SYO 701 EDR Module FC

Authored by Wayground Content

Computers

University

SYO 701 EDR Module FC
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

60. A recent malware outbreak across a subnet included successful rootkit installations on many PCs, ensuring persistence by rendering remediation efforts ineffective. Which of the following would best detect the presence of a rootkit in the future?

A. FDE

B. NIDS

C. EDR

D. DLP

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

170. A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee's corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation. Which of the following logs should the analyst use as a data source?

A. Application

B. IPS/IDS

C. Network

D. Endpoint

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

392. A new vulnerability enables a type of malware that allows the unauthorized movement of data from a system. Which of the following would detect this behavior?

A . Implementing encryption

B . Monitoring outbound traffic

C . Using default settings

D . Closing all open ports

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

360. A security administrator recently reset local passwords and the following values were recorded in the system:

Which of the following in the security administrator most likely protecting against?

A . Account sharing

B . Weak password complexity

C . Pass-the-hash attacks

D . Password compromise

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

201. A bank set up a new server that contains customers' PII. Which of the following should the bank use to make sure the sensitive data is not modified?

A. Full disk encryption

B. Network access control

C. File integrity monitoring

D. User behavior analytics

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

494. An organization needs to monitor its users’ activities in order to prevent insider threats. Which of the following solutions would help the organization achieve this goal?

A. Behavioral analytics

B. Access control lists

C. Identity and access management

D. Network intrusion detection system

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

454. Executives at a company are concerned about employees accessing systems and information about sensitive company projects unrelated to the employees’ normal job duties. Which of the following enterprise security capabilities will the security team most likely deploy to detect that activity?

A. UBA

B. EDR

C. NAC

D. DLP

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?