Defense in Depth – Shuffle Q/A 2

40. A network security analyst received an alert about a potential malware threat on a user’s computer. What can the analyst review to get detailed information about this compromise? Select all that apply.

  • Full disk encryption (FDE)
  • Security Information and Event Management (SIEM) system
  • Logs
  • Binary whitelisting software

41. Which of the following are potential attack vectors? Select all that apply

  • Passwords
  • Network protocols
  • Email attachments
  • Network interfaces

42. What is the best way to avoid personal, one-off software installation requests?

  • A strict no-installation policy
  • A clear application whitelist policy
  • An application honor code policy
  • An accept-all application policy

43. What is the purpose of installing updates on your computer? Select all that apply.

  • Updating improves performance and stability
  • Updating helps block all unwanted traffic
  • Updating addresses security vulnerabilities
  • Updating adds new features

Devendra Kumar

Project Management Apprentice at Google

Leave a Reply