in Education by
The full form of EDR is _______ (a) Endpoint Detection and recovery (b) Early detection and response (c) Endpoint Detection and response (d) Endless Detection and Recovery The question was asked in semester exam. The above asked question is from Information Security Technologies in division Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Correct option is (c) Endpoint Detection and response For explanation: It is a collective name for tools that monitor networks & endpoints of systems and record all the activities for further reporting, analysis & detection in a central database. Analyzing the reports generated through such EDR tools, loopholes in a system or any internal, as well as external breaching attempts can be detected.

Related questions

0 votes
    The full form of Malware is ________ (a) Malfunctioned Software (b) Multipurpose Software (c) Malicious Software (d) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    What is the full form of ITA-2000? (a) Information Tech Act -2000 (b) Indian Technology Act -2000 (c) ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    The full form of OSI is OSI model is ______________ (a) Open Systems Interconnection (b) Open Software Interconnection ( ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    The full form of C&C is ____________ (a) command and control (b) copy and cut (c) command and capture ... ,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Variables that gets created dynamically when a function (such as malloc()) is called is created in the form of ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Which is the legal form of hacking based on which jobs are provided in IT industries and firms? (a) Cracking (b ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    ___________ is a special form of attack using which hackers' exploit - human psychology. (a) Cross Site Scripting ( ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    The method of reverting the encrypted text which is known as cipher text to its original form i.e. plain ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    _______ is the oldest phone hacking techniques used by hackers to make free calls (a) Phishing (b) Spamming (c) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Governments hired some highly skilled hackers. These types of hackers are termed as _______ (a) Special Hackers (b) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    _______ of information means, only authorised users are capable of accessing the information. (a) Confidentiality (b) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    _______ technology is used for analyzing and monitoring traffic in network and information flow. (a) Cloud access security ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
...