Which type of cyberattack is known as "digital kidnapping"
What is Ransomware
An attacker inserted a piece of malicious code into a live process. Which of the following type of attack is taking place?
What is DLL Injection
What licenses give you access to Microsoft Defender XDR features via the Microsoft Defender portal without additional cost
What is Microsoft 365 E5 or A5
How many companies make up Avertium?
What is 4
Which type of cyber attack comes via text message?
You have configured NIC teaming in a critical server. Along with redundancy, which of the following does the NIC team provide?
What is Load balancing
What applications make up "Microsoft XDR"
What is Sentinel, cloud apps, endpoint, identity, and office 365
What is Avertium's mission?
What is to relentlessly protect customers against cyber risk and deliver outcomes through innovative security services
What is Zero-Trust Architecture
What is a network where all systems/resources need explicit access to be able to communicate
Which protocol should you use to secure voice and video?
What is SRTP
What is system administrator
When did Bill Carroll join Avertium as CEO?
What is November 2022
What is SQL injection?
What is used to inject malicious code to a database server, through query
What can reduce the impact of lateral movement in an attack?
What is Network segmentation
What is American Petroleum Institute
What is our three-step approach to our cyber security strategy?
What is assess, design, protect
Classifications of incidents should generally be according to?
What is Category, sensitivity, and criticality
An attacker is using the hashes to crack an authentication protocol. Which type of attack is occurring?
What is Pass the Hash
Can customers still use Microsoft Defender XDR without E5 licenses?
Sword and Shield, Terre Verde, 1440, TruShield