This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
What should you do to quarantine a compromised device?
Delete system files on the device to mitigate the damage.
Disconnect the device from the network.
Run the latest update on a device.
You find a file that you don't recognize in one of your folders. What should you do?
Open it to see if you can recognize it.
Remove the file to ensure that you don't accidentally run ransomware.
Scan the file with an antimalware program.
What should you do before you retrieve backups to use for recovery?
Delete local backups to prevent the attack from spreading.
Create a new backup when the attack happens.
Verify the backup files don't contain malicious code.
Which of the following best describes an attack trajectory?
The path a cybercriminal could take to carry out an attack on administrator accounts.
The steps a cybercriminal could take to carry out an attack inside a particular server.
The path a cybercriminal could take to carry out an attack across different entities.
What should an organization use to effectively monitor for suspicious file activity across all its devices in the network?
A user monitoring and alerting tool.
A file integrity monitoring tool.
A network monitoring tool.
What are factory default settings?
The state your device was in when it was first bought.
The latest restore point to use for any device.
The last known good backup available for the device.
You must answer all questions before checking your work.
Was this page helpful?