logo

Crowdly

Browser

Додати до Chrome

MAR-2-1

Шукаєте відповіді та рішення тестів для MAR-2-1? Перегляньте нашу велику колекцію перевірених відповідей для MAR-2-1 в moodle.epitest.eu.

Отримайте миттєвий доступ до точних відповідей та детальних пояснень для питань вашого курсу. Наша платформа, створена спільнотою, допомагає студентам досягати успіху!

Imagine that you’re the lone cybersecurity professional in your organization. Malwarebytes is installed on all company computers and scans them every evening. But because of a recent security incident on an employee’s device, you want to schedule an additional regular scan on his device. This scan will occur every morning. You open Malwarebytes on his device, and the Malwarebytes window is displayed. View the screenshot of the Malwarebytes window for reference.

What must you select in the Malwarebytes window to schedule a new scan?

Image failed to load: The Malwarebytes window.

100%
0%
0%
0%
Переглянути це питання

During a busy workday, you receive an unexpected email from a coworker. In the email, your coworker asks for assistance with an urgent task. The email requests information that you don’t typically share.

What should you do?

0%
83%
0%
17%
Переглянути це питання

Imagine that you’re a cybersecurity professional at a large financial company. To save money, your company’s leadership wants to reduce its investment in various resources, including threat intelligence. You have an opportunity to speak with leadership to explain why threat intelligence is a valuable part of your company’s cyberdefense.

What is one benefit of threat intelligence that you should mention?

0%
100%
0%
0%
Переглянути це питання

Mariana is a cybersecurity analyst in her organization’s security operations center (SOC). She’s become frustrated by the number of false security alerts that her network monitoring tool issues. She wants to better understand the cause of false positives.

Which of the following events can cause a false positive?

20%
0%
0%
80%
Переглянути це питання

Krysia is a vulnerability assessment specialist for her company. She performs a port scan on one of her company’s network devices and discovers that TCP port 80 is open.

What should Krysia conclude from her discovery?

0%
50%
25%
25%
Переглянути це питання

If you’d like to pursue a career in cybersecurity, getting an industry-recognized certification can help accelerate your learning.

Which of the following items is an industry-recognized cybersecurity certification that you can consider in the future?

Select all that apply.

0%
100%
60%
40%
Переглянути це питання

You’re a cybersecurity consultant advising a client on potential threats. The client asks why many cybercriminals use cryptocurrencies for their illicit activities.

How do you respond?

60%
0%
20%
20%
Переглянути це питання

Imagine that you’re using Zenmap to scan a host.

What information about the host do you need to perform your scan?

0%
17%
0%
83%
Переглянути це питання

Chantelle is a cybersecurity consultant hired to create a security strategy for Mapleview Medical Center, a local healthcare provider. She wants to include all the basic components of a comprehensive security strategy.

What components should Chantelle include in the security strategy?

Select all that apply.

29%
100%
86%
57%
Переглянути це питання

A friendly stranger in a work uniform is trying to get into your workplace building. They say that someone at the head office sent them, but they forgot their pass.

What should you do?

100%
0%
0%
0%
Переглянути це питання

Хочете миттєвий доступ до всіх перевірених відповідей на moodle.epitest.eu?

Отримайте необмежений доступ до відповідей на екзаменаційні питання - встановіть розширення Crowdly зараз!

Browser

Додати до Chrome