List of questions
Related questions
Question 129 - SC-100 discussion
Your company wants to optimize using Microsoft Defender for Endpoint to protect its resources against ransomware based on Microsoft Security Best Practices. You need to prepare a post-breach response plan for compromised computers based on the Microsoft Detection and Response Team (DART) approach in Microsoft Security Best Practices. What should you include in the response plan?
A.
controlled folder access
B.
application isolation
C.
memory scanning
D.
machine isolation
E.
user isolation
Your answer:
0 comments
Sorted by
Leave a comment first