Question

In: Computer Science

1.Which of the following statements about endpoint solution is true?(choose one or more) A. Similar to...

1.Which of the following statements about endpoint solution is true?(choose one or more)

A. Similar to network based monitoring, encryption can be an obstacle for endpoint based monitorinng

B. Endpoint agents can actively prevent attacks in realtime

C. Network based monitoring can be simpler to deploy than endpoint monitoring because it can concentrate on a few network appliannces

D. Endpoint agents can monitor application programs, users, as well as network activities

2. Which of the following windows events typically deserve high security alert by itself?

A. Logclearing

B. User added to global admin group

C. Modification of HKLM registration nkey

D. New admin user creation

3.Which of the following windows events have the highest security risk?

A. Received a power operations request

B. Host has successfully loaded driver

C. Received request to load driver

D. New USB device plugged in

4.Which of the following are important to detect pass-the-hash attacks?(choose one or more)

A. Monitor new service creationnns

B. Enterprise-wide norm: use token based authentication such as Kerberos

C. Monitor modifications to HKLM/HKCU keys

D. Monitoring susscessful logon eventsw

5. Which of the following endpoint events might be generated by malicious activities in the "installation" phase of the kill chain?(choose one or more)

A. User added to global admin group

B. New user created

C. New service created

D. modifications to HKLM/HKCU

Solutions

Expert Solution

2. Which of the following windows events typically deserve high security alert by itself?

Answer:D. New admin user creation

  • Admin rights enable users to install new software, add accounts and amend the way systems operate. Full administrator rights allow users to own any file on the network - privileges always beat permissions.
  • Therefore this means that admin users can change ownership of relevant documents or folders and either restrict access, copy or transfer data without other authority, or tamper with protected security policies.</p>

3.Which of the following windows events have the highest security risk?

Answer: New USB device plugged in

  • Attackers can use USB drives to infect other computers with malware that can detect when the USB drive is plugged into a computer.
  • The malware then downloads malicious code onto the drive. When the USB drive is plugged into another computer, the malware infects that computer.

I was only sure about two questions.

If you have any doubts, leave a comment below and I'll help you out.


Related Solutions

Which one of the following statements about accredited investors is NOT true (choose one): a. If...
Which one of the following statements about accredited investors is NOT true (choose one): a. If start-ups want funding from angels or VCs, they must ensure these investors are accredited. b. The SEC does not officially certify accredited investors for each transaction. c. A start-up can get funding from its founders, even if they are not accredited. d. If start-ups issue an IPO, they must ensure that investors are accredited. e. Accredited investors must have enough personal financial strength to...
Which one of the following statements is NOT true about Angel investors and VCs (choose one)?...
Which one of the following statements is NOT true about Angel investors and VCs (choose one)? a. Both sets of investors consider factors such as management team, market size, business model, and sustainable competitive advantage b. Angels expect to get most of their returns from a few spectacular successes while VCs look for a higher percentage of successful companies c. VCs typically invest from funds they’ve raised while angels invest their own money d. VCs prefer investments with larger investment...
Which of the following statements is/are true? 1. Adding more solute in a solution increases its...
Which of the following statements is/are true? 1. Adding more solute in a solution increases its vapor pressure. 2. Temperature is inversely proportional to the solubility of gases.
xWhich of the following statements are true of pure competition? Choose one or more: A. Firms...
xWhich of the following statements are true of pure competition? Choose one or more: A. Firms act as price takers. B. The market demand curve and the demand curve facing a firm may be one and the same, at least at certain prices. C. The demand curve facing a competitive firm consists of a horizontal line at any price equal to or below the market price. D. There must be a very large number of sellers. E. The demand curve...
Which of the following statements are true? There may be more than one true statement. A....
Which of the following statements are true? There may be more than one true statement. A. Any linear combination of vectors can always be written in the form Ax for a suitable matrix A and vector x. B. Every matrix equation Ax=b corresponds to a vector equation with the same solution set. C. If the echelon form of the augmented matrix [A | b][A | b] has a leading entry in every row, then the equation Ax=b is inconsistent. D....
Which of the following statements is true? Note that more than one of the statements may...
Which of the following statements is true? Note that more than one of the statements may be true. a. Every relation that is in 3NF is in 2NF. b. A relation that is in 2NF, and that has a non-primary-key attribute that is functionally dependent on another non-primary-key attribute is not in 3NF. c. A relation that is in 2NF, and that has a non-primary-key attribute that is transitively functionally dependent on the primary key is not in 3NF. Which...
1. Which of the following are TRUE about sperm? Select one or more: a. Hyaluronidase is...
1. Which of the following are TRUE about sperm? Select one or more: a. Hyaluronidase is the enzyme involved in dissolving the protective coating around the unfertilized ovum. b. The first sperm cell to reach the egg successfully fertilizes that cell. c. Sperm cells have half the number of chromosomes as a spermatagoium and are about the same size. d. Sperm cell capacitation, which occurs after ejaculation, is required for sperm cells to be active. e. Mitochodria are located in...
1. Which of the following statements are true? Select all that apply. Select one or more:...
1. Which of the following statements are true? Select all that apply. Select one or more: a. Earnings per share is calculated by dividing retained earnings by the number of shares of common stock outstanding. b. The creditors of a firm must be satisfied before any earnings can be distributed to the common shareholders. c. When referring to ratio comparisons, time-series analysis compares a firm to that of an industry leader. d. The operating profit margin must take into account...
A) Which of the following statements are true? Note that there may be more than one...
A) Which of the following statements are true? Note that there may be more than one correct answer; select all that are true. As the p-value increases, the evidence against the null hypothesis also increases. In hypothesis testing, if the p-value is sufficiently small, then the null hypothesis can be rejected in favour of the alternate hypothesis. If the null hypothesis is true, then the p-value will always be greater than 0.1. If the null hypothesis is false, then the...
1. Which of the following statements is NOT true about cell size? Larger cells require more...
1. Which of the following statements is NOT true about cell size? Larger cells require more materials to survive. Material needs are tied to Volume. Maximum cell size is limited by the surface area to volume ratio When cell volume is doubled, the surface area is also doubled. As a cell increases in size, the volume increases faster than its surface area The amount of surface area of a cell determines how much material can be absorbed through the membrane...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT