Looking for MAR-2-1 test answers and solutions? Browse our comprehensive collection of verified answers for MAR-2-1 at moodle.epitest.eu.
Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!
Imagine that you’re the lone cybersecurity professional in your organization. Malwarebytes is installed on all company computers and scans them every evening. But because of a recent security incident on an employee’s device, you want to schedule an additional regular scan on his device. This scan will occur every morning. You open Malwarebytes on his device, and the Malwarebytes window is displayed. View the screenshot of the Malwarebytes window for reference.
What must you select in the Malwarebytes window to schedule a new scan?
During a busy workday, you receive an unexpected email from a coworker. In the email, your coworker asks for assistance with an urgent task. The email requests information that you don’t typically share.
What should you do?
Imagine that you’re a cybersecurity professional at a large financial company. To save money, your company’s leadership wants to reduce its investment in various resources, including threat intelligence. You have an opportunity to speak with leadership to explain why threat intelligence is a valuable part of your company’s cyberdefense.
What is one benefit of threat intelligence that you should mention?
Mariana is a cybersecurity analyst in her organization’s security operations center (SOC). She’s become frustrated by the number of false security alerts that her network monitoring tool issues. She wants to better understand the cause of false positives.
Which of the following events can cause a false positive?
Krysia is a vulnerability assessment specialist for her company. She performs a port scan on one of her company’s network devices and discovers that TCP port 80 is open.
What should Krysia conclude from her discovery?
If you’d like to pursue a career in cybersecurity, getting an industry-recognized certification can help accelerate your learning.
Which of the following items is an industry-recognized cybersecurity certification that you can consider in the future?
Select all that apply.
You’re a cybersecurity consultant advising a client on potential threats. The client asks why many cybercriminals use cryptocurrencies for their illicit activities.
How do you respond?
Imagine that you’re using Zenmap to scan a host.
What information about the host do you need to perform your scan?
Chantelle is a cybersecurity consultant hired to create a security strategy for Mapleview Medical Center, a local healthcare provider. She wants to include all the basic components of a comprehensive security strategy.
What components should Chantelle include in the security strategy?
Select all that apply.
A friendly stranger in a work uniform is trying to get into your workplace building. They say that someone at the head office sent them, but they forgot their pass.
What should you do?