已不再支援此瀏覽器。
請升級至 Microsoft Edge,以利用最新功能、安全性更新和技術支援。
Choose the best response for each of the following questions.
As hackers around the globe launch increasingly sophisticated attacks, organizations need tools that provide extra protection. A typical outbreak consists of two parts. The first part is a zero-day attack that consists of malware with unknown signatures. What is the second part of the attack?
A lateral move inside the network to gain further control of sensitive users
An elongated period of attack
Compromising user credentials using brute force attacks, user group membership changes, and other methods
As the Microsoft 365 Administrator for Contoso, Holly Dickson has been researching a Microsoft product that monitors and analyzes user activities and information across a company's network. This product then creates a behavioral baseline for each user, which the product uses to identify user anomalies with adaptive built-in intelligence. What product provides these features?
Microsoft Defender for Identity
Microsoft Defender for Endpoint
Microsoft Defender for Office 365
As the Microsoft 365 Administrator for Fabrikam, Holly Spencer has been researching a Microsoft product that provides an organization's security analysts with reports and graphical views of the threat landscape in the company's tenant. This product provides actionable insights and recommendations on policy and enforcement. What product provides these features?
Microsoft Cloud App Security
Microsoft 365 Threat explorer
You must answer all questions before checking your work.
此頁面對您有幫助嗎?