ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 129 - SC-100 discussion

Report
Export

Your company wants to optimize using Microsoft Defender for Endpoint to protect its resources against ransomware based on Microsoft Security Best Practices. You need to prepare a post-breach response plan for compromised computers based on the Microsoft Detection and Response Team (DART) approach in Microsoft Security Best Practices. What should you include in the response plan?

A.

controlled folder access

Answers
A.

controlled folder access

B.

application isolation

Answers
B.

application isolation

C.

memory scanning

Answers
C.

memory scanning

D.

machine isolation

Answers
D.

machine isolation

E.

user isolation

Answers
E.

user isolation

Suggested answer: D
asked 05/10/2024
NEURONES TECHNOLOGIES
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first