MOC - Last Hurrah
MOC - Last Hurrah Quiz
Test your knowledge on cybersecurity and malware with our engaging MOC - Last Hurrah quiz! This quiz covers various aspects of security breaches, malware types, and effective response strategies.
- Assess your understanding of malware attributes
- Learn about proper security measures
- Engage with multiple choice and checkbox questions
Match the following | ||||
---|---|---|---|---|
Intrusion Detection System | Research and preparation | Virus Total | Ransomware | |
Is a service that allows you to submit a file for a malware scan | ||||
Type of malware which encrypts important data | ||||
Detecting breach evidence | ||||
One of the3phase attack in Timeline |
Container | Virtual Machine | Hyper-V containers | Enables you to separate your applications from your infrastructure | |
---|---|---|---|---|
Runs a complete operating system including the kernel | ||||
The container host doesn’t share its kernelwith other hyper-v contaners | ||||
Docker | ||||
Runs on the same O/S as the host |
You are the administrator of an Active Directory Domain Services (AD DS) domain. All server computers run Windows Server 2016. Some malicious software infects a specific network subnet. The malicious software performs DNS queries to the domain's DNS servers in an attempt to spread itself to other hosts.
You need to prevent the infected subnet from performing DNS queries to the domain's DNS servers. Your actions must not disrupt the DNS service in the rest of the subnets in the domain.
What technology should you configure?
- Your network contains an Active Directory domain named contoso.com. You create a Microsoft Operations Management Suite (OMS) workspace. You need to connect several computers directly to the workspace.
Which two pieces of information do you require?
- You are the administrator for your company. Your company is planning to deploy shielded virtual machines (VMs) to an external cloud platform that uses a guarded fabric with Trusted Platform Module (TPM)-attestation.
You are implementing an on-premises guarded host on a server that will run Windows Server 2016. You are evaluating the following two installation options for the guarded host server:
- Nano Server
- Desktop Experience
You need to identify any requirements that can only be met by using the Desktop Experience installation option for the on-premises guarded host.
Which capability can only be met by the Desktop Experience installation option?
- ______ enables easier management for BitLocker enabled desktops and servers in a domain environment by providing automatic unlock of operating system volumes at system reboot when connected to a wired corporate network.
This feature requires the client hardware to have a DHCP driver implemented in its UEFI firmware.
- Your network contains an Active Directory domain. Microsoft Advanced Threat Analytics (ATA) is deployed to the domain. A database administrator named DBA1 suspects that her user account was compromised.
Which three events can you identify by using ATA?
- This question relates to Windows Firewall and related technologies. These rules use IPsec to secure traffic while it crosses the network. You use these rules to specify that connections between two computers must be authenticated or encrypted.
What is the name for these rules?