Knowledge check

Completed

Choose the best response for each of the questions below. Then select Check your answers.

Check your knowledge

1.

As hackers around the globe launch increasingly sophisticated attacks, organizations need tools that provide extra protection. A typical outbreak consists of two parts. The first part is a zero-day attack that consists of malware with unknown signatures. What is the second part of the attack?

2.

As the Enterprise Administrator for Contoso, Holly Dickson has been researching a Microsoft product that will monitor and analyze user activities and information across Contoso's network. This product will then create a behavioral baseline for each Consoto user, which the product will use to identify user anomalies with adaptive built-in intelligence. What is the product that will provide these features for Contoso?

3.

As the Enterprise Administrator for Fabrikam, Holly Spencer has been researching a Microsoft product that will provide Fabrikam's security analysts with reports and graphical views of the threat landscape in Fabrikam's tenant. This product provides actionable insights and recommendations on policy and enforcement. What is the product that will provide these features for Fabrikam?