40. A network security analyst received an alert about a potential malware threat on a user’s computer. What can the analyst review to get detailed information about this compromise? Select all that apply.
- Full disk encryption (FDE)
- Security Information and Event Management (SIEM) system
- Logs
- Binary whitelisting software
41. Which of the following are potential attack vectors? Select all that apply
- Passwords
- Network protocols
- Email attachments
- Network interfaces
42. What is the best way to avoid personal, one-off software installation requests?
- A strict no-installation policy
- A clear application whitelist policy
- An application honor code policy
- An accept-all application policy
43. What is the purpose of installing updates on your computer? Select all that apply.
- Updating improves performance and stability
- Updating helps block all unwanted traffic
- Updating addresses security vulnerabilities
- Updating adds new features