logo

Crowdly

Browser

Add to Chrome

MAR-2-1

Looking for MAR-2-1 test answers and solutions? Browse our comprehensive collection of verified answers for MAR-2-1 at moodle.epitest.eu.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

Imagine that you’re the lone cybersecurity professional in your organization. Malwarebytes is installed on all company computers and scans them every evening. But because of a recent security incident on an employee’s device, you want to schedule an additional regular scan on his device. This scan will occur every morning. You open Malwarebytes on his device, and the Malwarebytes window is displayed. View the screenshot of the Malwarebytes window for reference.

What must you select in the Malwarebytes window to schedule a new scan?

Image failed to load: The Malwarebytes window.

100%
0%
0%
0%
View this question

During a busy workday, you receive an unexpected email from a coworker. In the email, your coworker asks for assistance with an urgent task. The email requests information that you don’t typically share.

What should you do?

0%
83%
0%
17%
View this question

Imagine that you’re a cybersecurity professional at a large financial company. To save money, your company’s leadership wants to reduce its investment in various resources, including threat intelligence. You have an opportunity to speak with leadership to explain why threat intelligence is a valuable part of your company’s cyberdefense.

What is one benefit of threat intelligence that you should mention?

0%
100%
0%
0%
View this question

Mariana is a cybersecurity analyst in her organization’s security operations center (SOC). She’s become frustrated by the number of false security alerts that her network monitoring tool issues. She wants to better understand the cause of false positives.

Which of the following events can cause a false positive?

20%
0%
0%
80%
View this question

Krysia is a vulnerability assessment specialist for her company. She performs a port scan on one of her company’s network devices and discovers that TCP port 80 is open.

What should Krysia conclude from her discovery?

0%
50%
25%
25%
View this question

If you’d like to pursue a career in cybersecurity, getting an industry-recognized certification can help accelerate your learning.

Which of the following items is an industry-recognized cybersecurity certification that you can consider in the future?

Select all that apply.

0%
100%
60%
40%
View this question

You’re a cybersecurity consultant advising a client on potential threats. The client asks why many cybercriminals use cryptocurrencies for their illicit activities.

How do you respond?

60%
0%
20%
20%
View this question

Imagine that you’re using Zenmap to scan a host.

What information about the host do you need to perform your scan?

0%
17%
0%
83%
View this question

Chantelle is a cybersecurity consultant hired to create a security strategy for Mapleview Medical Center, a local healthcare provider. She wants to include all the basic components of a comprehensive security strategy.

What components should Chantelle include in the security strategy?

Select all that apply.

29%
100%
86%
57%
View this question

A friendly stranger in a work uniform is trying to get into your workplace building. They say that someone at the head office sent them, but they forgot their pass.

What should you do?

100%
0%
0%
0%
View this question

Want instant access to all verified answers on moodle.epitest.eu?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!

Browser

Add to Chrome