Knowledge check

Completed

Choose the best response for each of the following questions. Then select Check your answers.

Check your knowledge

1.

As hackers around the globe launch increasingly sophisticated attacks, organizations need tools that provide extra protection. A typical outbreak consists of two parts. The first part is a zero-day attack that consists of malware with unknown signatures. What is the second part of the attack?

2.

As the Microsoft 365 Administrator for Contoso, Holly Dickson has been researching a Microsoft product that monitors and analyzes user activities and information across a company's network. This product then creates a behavioral baseline for each user, which the product uses to identify user anomalies with adaptive built-in intelligence. What product provides these features?

3.

As the Microsoft 365 Administrator for Fabrikam, Holly Spencer has been researching a Microsoft product that provides an organization's security analysts with reports and graphical views of the threat landscape in the company's tenant. This product provides actionable insights and recommendations on policy and enforcement. What product provides these features?