Defense in Depth – Shuffle Q/A 2 Post author:Devendra Kumar Post published: Post comments:0 Comments 40. A network security analyst received an alert about a potential malware threat on a user’s computer. What can the analyst review to get detailed information about this compromise? Select all that apply. Answers Full disk encryption (FDE)Security Information and Event Management (SIEM) systemLogs Binary whitelisting software 41. Which of the following are potential attack vectors? Select all that apply Answers PasswordsNetwork protocolsEmail attachmentsNetwork interfaces 42. What is the best way to avoid personal, one-off software installation requests? Answers A strict no-installation policyA clear application whitelist policyAn application honor code policyAn accept-all application policy 43. What is the purpose of installing updates on your computer? Select all that apply. Answers Updating improves performance and stabilityUpdating helps block all unwanted trafficUpdating addresses security vulnerabilitiesUpdating adds new features Previous Please Share This Share this content Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Devendra Kumar Project Management Apprentice at Google You Might Also Like Module 5: Project Monitoring and Control Week 2 – Scrum 101 – Shuffle Q/A 3 Leave a Reply Cancel replyCommentEnter your name or username to comment Enter your email address to comment Enter your website URL (optional) Save my name, email, and website in this browser for the next time I comment.