Black Friday Goodies - 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: av54zq84

Exact2Pass Menu

Question # 4

Which security control is complementary to IPS, providing a second layer of protection against network attacks?

A.

Host Integrity

B.

Antimalware

C.

Firewall

D.

Network Protection

Full Access
Question # 5

What is the frequency of feature updates with SES and the Integrated Cyber Defense Manager (ICDm)

A.

Monthly

B.

Weekly

C.

Quarterly

D.

Bi-monthly

Full Access
Question # 6

What happens when an administrator blacklists a file?

A.

The file is assigned to the Blacklist task list

B.

The file is automatically quarantined

C.

The file is assigned to a chosen Blacklist policy

D.

The file is assigned to the default Blacklist policy

Full Access
Question # 7

Which statement best describes Artificial Intelligence?

A.

A program that automates tasks with a static set of instructions

B.

A program that can predict when a task should be performed

C.

A program that is autonomous and needs training to perform a task

D.

A program that learns from experience and perform autonomous tasks

Full Access
Question # 8

Which type of security threat is used by attackers to exploit vulnerable applications?

A.

Lateral Movement

B.

Privilege Escalation

C.

Command and Control

D.

Credential Access

Full Access
Question # 9

Which Endpoint > Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?

A.

Discover Endpoints

B.

Endpoint Enrollment

C.

Discover and Deploy

D.

Device Discovery

Full Access
Question # 10

An administrator suspects that several computers have become part of a botnet. What should the administrator do to detect botnet activity on the network?

A.

Enable the Command and Control Server Firewall

B.

Add botnet related signatures to the IPS policy's Audit Signatures list

C.

Enable the IPS policy's Show notification on the device setting

D.

Set the Antimalware policy's Monitoring Level to 4

Full Access