What are two endpoint security implementation methods? (Choose two.)
Correct Answer:
AD
🗳️
Which tool resides on a host to identify malicious activity?
Correct Answer:
C
🗳️
Which type of device does a Host-Based Intrusion Detection System (HIDS) monitor?
Correct Answer:
B
🗳️
What is the primary goal of the Weaponization and Delivery stage in the cyber attack lifecycle?
Correct Answer:
D
🗳️