When are events generated within SEDR?

When are events generated within SEDR?A . When an incident is selectedB . When an activity occursC . When any event is openedD . When entities are viewedView AnswerAnswer: B Explanation: In Symantec Endpoint Detection and Response (SEDR), events are generated when an activity occurs. This includes any actions or...

January 30, 2025 No Comments READ MORE +

Which technology can prevent an unknown executable from being downloaded through a browser session?

Which technology can prevent an unknown executable from being downloaded through a browser session?A . Intrusion PreventionB . InsightC . Application ControlD . Advanced Machine LearningView AnswerAnswer: B Explanation: Symantec Insight technology can prevent the download of unknown executables through a browser session by leveraging a cloud-based reputation service. Insight...

January 30, 2025 No Comments READ MORE +

Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files results in a comparable number of false positives and false negatives."

Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files results in a comparable number of false positives and false negatives."A . Level 6B . Level 5C . Level 2D . Level 1View AnswerAnswer: B Explanation: In antimalware solutions, Level...

January 29, 2025 No Comments READ MORE +

Which type of security threat continues to threaten endpoint security after a system reboot?

Which type of security threat continues to threaten endpoint security after a system reboot?A . file-lessB . memory attackC . scriptD . RootkitView AnswerAnswer: D Explanation: A Rootkit is a type of security threat that can persist across system reboots, making it difficult to detect and remove. Rootkits operate by...

January 26, 2025 No Comments READ MORE +