Question 1
Which two (2) steps should an administrator take to guard against re-occurring threats? (Select two)
Question 2
In which phase of MITRE framework would attackers exploit faults in software to directly tamper with system memory?
Question 3
Which option should an administrator utilize to temporarily or permanently block a file?
Question 4
Which two (2) options is an administrator able to use to prevent a file from being fasely detected (Select two)
Question 5
Which SES security control protects against threats that may occur in the Impact phase?