I vote for D - creating recovery plan.
1.Recognize different types of ransomware
2.Help an organization mitigate risk of a ransomware attack by creating a recovery plan
3.Help an organization mitigate risk of a ransomware attack by limiting the scope of damage
4.Help an organization mitigate risk of a ransomware attack by hardening key infrastructure elements
https://learn.microsoft.com/en-us/training/modules/recommend-ransomware-strategy-by-using-microsoft-security-best-practices/
Agree - as stated in the Phase 1 is the learning docs:
https://learn.microsoft.com/en-us/training/modules/recommend-ransomware-strategy-by-using-microsoft-security-best-practices/2-plan-for-ransomware-protection-extortion-based-attacks
D. Prepare a recovery plan.
Preparing a recovery plan is essential as it lays out the specific actions and protocols to be followed in the event of a ransomware attack. A well-defined recovery plan ensures that you can quickly and effectively respond to an attack, minimize damage, and restore operations as soon as possible.
D is the answer.
https://learn.microsoft.com/en-us/training/modules/design-resiliency-strategy-common-cyberthreats-like-ransomware/3-ransomware-protection
Microsoft best practices for ransomware protection are based on a three step approach:
- Prepare your recovery plan
- Limit the scope of the damage
- Make it hard to get in
D is the answer.
https://learn.microsoft.com/en-us/training/modules/design-resiliency-strategy-common-cyberthreats-like-ransomware/3-ransomware-protection
Microsoft best practices for ransomware protection are based on a three step approach:
- Prepare your recovery plan
- Limit the scope of the damage
- Make it hard to get in
Phase 1 of ransomware protection is to develop a recovery plan.
The first thing you should do for these attacks is prepare your organization so that it has a viable alternative to paying the ransom.
https://learn.microsoft.com/en-us/training/modules/recommend-ransomware-strategy-by-using-microsoft-security-best-practices/2-plan-for-ransomware-protection-extortion-based-attacks
Phase 1 of ransomware protection is to develop a recovery plan.
The first thing you should do for these attacks is prepare your organization so that it has a viable alternative to paying the ransom.
https://learn.microsoft.com/en-us/training/modules/recommend-ransomware-strategy-by-using-microsoft-security-best-practices/2-plan-for-ransomware-protection-extortion-based-attacks
This section is not available anymore. Please use the main Exam Page.SC-100 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
MaciekMT
Highly Voted 1 year, 1 month agoNian
1 year, 1 month agorishiraval007
Most Recent 7 months, 1 week agozellck
1 year agozellck
1 year agozellck
1 year agozellck
1 year agoBurnie
1 year, 1 month agoBurnie
1 year, 1 month agojanesb
1 year, 1 month agojanesb
1 year, 1 month agoshinda
1 year, 2 months ago