SYO 701 EDR Module FC

SYO 701 EDR Module FC

University

20 Qs

quiz-placeholder

Similar activities

Cryptology

Cryptology

9th Grade - University

15 Qs

MID ISDA - Even

MID ISDA - Even

University

20 Qs

COMPUTING CHAPTER 3-4 part1

COMPUTING CHAPTER 3-4 part1

University

15 Qs

DBMS

DBMS

University

15 Qs

Security

Security

University - Professional Development

20 Qs

System Analysis and Design-MQ1-CH1

System Analysis and Design-MQ1-CH1

University

20 Qs

CySa+ PT5: 2 of 3

CySa+ PT5: 2 of 3

9th Grade - Professional Development

20 Qs

Information and Convergence Technology

Information and Convergence Technology

12th Grade - University

21 Qs

SYO 701 EDR Module FC

SYO 701 EDR Module FC

Assessment

Quiz

Computers

University

Hard

Created by

Wayground Content

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

60. A recent malware outbreak across a subnet included successful rootkit installations on many PCs, ensuring persistence by rendering remediation efforts ineffective. Which of the following would best detect the presence of a rootkit in the future?

A. FDE

B. NIDS

C. EDR

D. DLP

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

170. A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee's corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation. Which of the following logs should the analyst use as a data source?

A. Application

B. IPS/IDS

C. Network

D. Endpoint

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

392. A new vulnerability enables a type of malware that allows the unauthorized movement of data from a system. Which of the following would detect this behavior?

A . Implementing encryption

B . Monitoring outbound traffic

C . Using default settings

D . Closing all open ports

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

360. A security administrator recently reset local passwords and the following values were recorded in the system:

Which of the following in the security administrator most likely protecting against?

A . Account sharing

B . Weak password complexity

C . Pass-the-hash attacks

D . Password compromise

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

201. A bank set up a new server that contains customers' PII. Which of the following should the bank use to make sure the sensitive data is not modified?

A. Full disk encryption

B. Network access control

C. File integrity monitoring

D. User behavior analytics

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

494. An organization needs to monitor its users’ activities in order to prevent insider threats. Which of the following solutions would help the organization achieve this goal?

A. Behavioral analytics

B. Access control lists

C. Identity and access management

D. Network intrusion detection system

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

454. Executives at a company are concerned about employees accessing systems and information about sensitive company projects unrelated to the employees’ normal job duties. Which of the following enterprise security capabilities will the security team most likely deploy to detect that activity?

A. UBA

B. EDR

C. NAC

D. DLP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?