Knowledge check

Completed
1.

What should you do to quarantine a compromised device?

2.

You find a file that you don't recognize in one of your folders. What should you do?

3.

What should you do before you retrieve backups to use for recovery?

4.

Which of the following best describes an attack trajectory?

5.

What should an organization use to effectively monitor for suspicious file activity across all its devices in the network?

6.

What are factory default settings?