SYO 701 EDR Module FC

SYO 701 EDR Module FC

University

20 Qs

quiz-placeholder

Similar activities

Multimedia Video & Animation

Multimedia Video & Animation

University

20 Qs

Django-quiz

Django-quiz

5th Grade - University

20 Qs

MIDTERM EXAM - IT APP

MIDTERM EXAM - IT APP

University

17 Qs

Evaluasi Pertemuan 12 DRPL TI-3B

Evaluasi Pertemuan 12 DRPL TI-3B

University

15 Qs

DreamWeaver CS6

DreamWeaver CS6

University

20 Qs

Kuis Dadakan ;)

Kuis Dadakan ;)

10th Grade - University

15 Qs

Banco de Dados

Banco de Dados

University - Professional Development

20 Qs

Python Quiz For Starters

Python Quiz For Starters

3rd Grade - Professional Development

17 Qs

SYO 701 EDR Module FC

SYO 701 EDR Module FC

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Wayground Content

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

60. A recent malware outbreak across a subnet included successful rootkit installations on many PCs, ensuring persistence by rendering remediation efforts ineffective. Which of the following would best detect the presence of a rootkit in the future?

A. FDE

B. NIDS

C. EDR

D. DLP

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

170. A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee's corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation. Which of the following logs should the analyst use as a data source?

A. Application

B. IPS/IDS

C. Network

D. Endpoint

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

392. A new vulnerability enables a type of malware that allows the unauthorized movement of data from a system. Which of the following would detect this behavior?

A . Implementing encryption

B . Monitoring outbound traffic

C . Using default settings

D . Closing all open ports

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

360. A security administrator recently reset local passwords and the following values were recorded in the system:

Which of the following in the security administrator most likely protecting against?

A . Account sharing

B . Weak password complexity

C . Pass-the-hash attacks

D . Password compromise

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

201. A bank set up a new server that contains customers' PII. Which of the following should the bank use to make sure the sensitive data is not modified?

A. Full disk encryption

B. Network access control

C. File integrity monitoring

D. User behavior analytics

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

494. An organization needs to monitor its users’ activities in order to prevent insider threats. Which of the following solutions would help the organization achieve this goal?

A. Behavioral analytics

B. Access control lists

C. Identity and access management

D. Network intrusion detection system

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

454. Executives at a company are concerned about employees accessing systems and information about sensitive company projects unrelated to the employees’ normal job duties. Which of the following enterprise security capabilities will the security team most likely deploy to detect that activity?

A. UBA

B. EDR

C. NAC

D. DLP

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?