March Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Where is the File Fetch context menu option available?

A.

anywhere a filename or SHA-256 hash is displayed

B.

only from the Filter Event View page

C.

from the Audit Event page

D.

from the configuration in the Business Defaults page

Full Access
Question # 5

Which set of actions would you take to create a simple custom detection?

A.

Add a SHA-256 value; upload a file to calculate a SHA-256 value; upload a text file that contains SHA-256 values.

B.

Upload a packet capture; use a Snort rule; use a ClamAV rule.

C.

Manually input the PE header data, the MD-5 hash, and a list of MD-5 hashes.

D.

Input the file and file name.

Full Access
Question # 6

How does application blocking enhance security?

A.

It identifies and logs usage.

B.

It tracks application abuse.

C.

It deletes identified applications.

D.

It blocks vulnerable applications from running, until they are patched.

Full Access
Question # 7

What do policies enable you to do?

A.

specify a custom whitelist

B.

specify group membership

C.

specify hosts to include in reports

D.

specify which events to view

Full Access