Summer Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which Firewall Stealth setting prevents OS fingerprinting by sending erroneous OS information back to the attacker?

A.

Disable OS fingerprint profiling

B.

Disable OS fingerprint detection

C.

Enable OS fingerprint masqueradi

D.

Enable OS fingerprint protection

Full Access
Question # 5

Which security control is complementary to IPS, providing a second layer of protection against network attacks?

A.

Host Integrity

B.

Antimalware

C.

Firewall

D.

Network Protection

Full Access
Question # 6

What does an end-user receive when an administrator utilizes the Invite User feature to distribute the SES client?

A.

An email with a link to directly download the SES client

B.

An email with a link to a KB article explaining how to install the SES Agent

C.

An email with the SES_setup.zip file attached

D.

An email with link to register on the ICDm user portal

Full Access
Question # 7

In which phase of MITRE framework would attackers exploit faults in software to directly tamper with system memory?

A.

Exfiltration

B.

Discovery

C.

Execution

D.

Defense Evasion

Full Access
Question # 8

What must an administrator check prior to enrolling an on-prem SEPM infrastructure into the cloud?

A.

Clients are running SEP 14.2 or later

B.

Clients are running SEP 14.1.0 or later

C.

Clients are running SEP 12-6 or later

D.

Clients are running SEP 14.0.1 or late

Full Access
Question # 9

Which SES feature helps administrator apply policies based on specific endpoint profiles?

A.

Device Groups

B.

Device Profiles

C.

Policy Bundles

D.

Policy Groups

Full Access
Question # 10

Which term or expression is utilized when adversaries leverage existing tools in the environment?

A.

opportunistic attack

B.

script kiddies

C.

living off the land

D.

file-less attack

Full Access