
SYO 701 EDR Module FC
Authored by Wayground Content
Computers
University

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
60. A recent malware outbreak across a subnet included successful rootkit installations on many PCs, ensuring persistence by rendering remediation efforts ineffective. Which of the following would best detect the presence of a rootkit in the future?
A. FDE
B. NIDS
C. EDR
D. DLP
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
170. A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee's corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation. Which of the following logs should the analyst use as a data source?
A. Application
B. IPS/IDS
C. Network
D. Endpoint
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
392. A new vulnerability enables a type of malware that allows the unauthorized movement of data from a system. Which of the following would detect this behavior?
A . Implementing encryption
B . Monitoring outbound traffic
C . Using default settings
D . Closing all open ports
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
360. A security administrator recently reset local passwords and the following values were recorded in the system:
Which of the following in the security administrator most likely protecting against?
A . Account sharing
B . Weak password complexity
C . Pass-the-hash attacks
D . Password compromise
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
201. A bank set up a new server that contains customers' PII. Which of the following should the bank use to make sure the sensitive data is not modified?
A. Full disk encryption
B. Network access control
C. File integrity monitoring
D. User behavior analytics
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
494. An organization needs to monitor its users’ activities in order to prevent insider threats. Which of the following solutions would help the organization achieve this goal?
A. Behavioral analytics
B. Access control lists
C. Identity and access management
D. Network intrusion detection system
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
454. Executives at a company are concerned about employees accessing systems and information about sensitive company projects unrelated to the employees’ normal job duties. Which of the following enterprise security capabilities will the security team most likely deploy to detect that activity?
A. UBA
B. EDR
C. NAC
D. DLP
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?