Which methodology does Identity Threat Detection and Response (ITDR) use?
Correct Answer:
A
🗳️
Which technology grants enhanced visibility and threat prevention locally on a device?
Correct Answer:
A
🗳️
What are two examples of an attacker using social engineering? (Choose two.)
Correct Answer:
AC
🗳️
Which two services does a managed detection and response (MDR) solution provide? (Choose two.)
Correct Answer:
BD
🗳️