Question 1

Which two (2) steps should an administrator take to guard against re-occurring threats? (Select two)
  • Question 2

    In which phase of MITRE framework would attackers exploit faults in software to directly tamper with system memory?
  • Question 3

    Which option should an administrator utilize to temporarily or permanently block a file?
  • Question 4

    Which two (2) options is an administrator able to use to prevent a file from being fasely detected (Select two)
  • Question 5

    Which SES security control protects against threats that may occur in the Impact phase?