Jump to content

rubinger

Members
  • Content Count

    2
  • Joined

  • Last visited

About rubinger

  • Rank
    Newbie

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. hi, i dont know the answer for Q1 . for Q2 2 - install agent based defenses for anti virus, EDR, and phishing products, segment the network implement permissions. implement CDR and antivirus scan on incoming attachments. block hardware on the local workstations.
  2. hi everyone, I got an home assignment during an interview to a cyber role with the following questions, can you please me help with them. I would appreciate it if you could elaborate as much as possible. *You are a cyber attacker trying to grab a file from an employee’s machine (Windows machine). You only know the employee’s name. List all methods the attacker can try to achieve his goals. Please be verbose and provide as many details as possible. What specific cybersecurity solution/feature can block/prevent/detect each of these methods? How can attackers overcome these defenses? thank you
×
×
  • Create New...