Which tool can be used to assist with auditing post-incident baselines?
Microsoft Security Compliance Toolkit
:
You are using the Microsoft Edge browser, by which means can you view and verify the details of a website’s certificate?
Click the padlock icon in the toolbar, choose Connection is secure
:
False antivirus or malware alerts are typically generated by which component?
Browser
:
Which option is NOT a feature of a password manager?
Enforce the minimum number of characters
:
Which command can be used to determine which group policies have been received by your system?
gpresult /r
:
Which aspect of dealing with security issues is a chain of custody primarily used for?
Preserving evidence
:
Which component would you most likely suspect to have been corrupted if your system is continually redirected to suspicious websites while browsing?
Hosts file
:
Place the phases of dealing with a security breach in the correct sequence.
Identification and logging
Containment and isolation
Eradication and recovery
Escalation and communication
Lessons learned
:
Which command can be used to test connectivity to your domain controller if you suspect there are connectivity issues on the network?
nltest /dsgetdc






.png)