1. As hackers around the globe launch increasingly sophisticated attacks, organizations need tools that provide extra protection. A typical outbreak consists of two parts. The first part is a zero-day attack that consists of malware with unknown signatures. What is the second part of the attack? A lateral move inside the network to gain further control of sensitive users An elongated period of attack Compromising user credentials using brute force attacks, user group membership changes, and other methods 2. As the Microsoft 365 Administrator for Contoso, Holly Dickson has been researching a Microsoft product that monitors and analyzes user activities and information across a company's network. This product then creates a behavioral baseline for each user, which the product uses to identify user anomalies with adaptive built-in intelligence. What product provides these features? Microsoft Defender for Identity Microsoft Defender for Endpoint Microsoft Defender for Office 365 3. As the Microsoft 365 Administrator for Fabrikam, Holly Spencer has been researching a Microsoft product that provides an organization's security analysts with reports and graphical views of the threat landscape in the company's tenant. This product provides actionable insights and recommendations on policy and enforcement. What product provides these features? Microsoft Cloud App Security Microsoft Defender for Endpoint Microsoft 365 Threat explorer