Which Endpoint > Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?
Which Endpoint > Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?A . Discover EndpointsB . Endpoint EnrollmentC . Discover and DeployD . Device DiscoveryView AnswerAnswer: A
Which dashboard should an administrator access to view the current health of the environment?
Which dashboard should an administrator access to view the current health of the environment?A . The Antimalware DashboardB . The SES DashboardC . The Device Integrity DashboardD . The Security Control DashboardView AnswerAnswer: D
Which computer meets the pre-requisites for the SES client?
An administrator is evaluating an organization's computers for an upcoming SES deployment . Which computer meets the pre-requisites for the SES client?A . A computer running Mac OS X 10.8 with 500 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processorB . A...
Which framework, open and available to any administrator, is utilized to categorize adversarial tactics and for each phase of a cyber attack?
Which framework, open and available to any administrator, is utilized to categorize adversarial tactics and for each phase of a cyber attack?A . MITRE RESPONSEB . MITRE ATT&CKC . MITRE ADV&NCED . MITRE ATTACK MATRIXView AnswerAnswer: C
What should an administrator do to display only high risk files?
An administrator selects the Discovered Items list in the ICDm to investigate a recent surge in suspicious file activity . What should an administrator do to display only high risk files?A . Apply a list controlB . Apply a search ruleC . Apply a list filterD . Apply a search...
Which two (2) scan range options are available to an administrator for locating unmanaged endpoints? (Select two)
Which two (2) scan range options are available to an administrator for locating unmanaged endpoints? (Select two)A . IP range within networkB . IP range within subnetC . Entire NetworkD . Entire SubnetE . Subnet RangeView AnswerAnswer: A,E
What are the Exploit Mitigation security control's mitigation techniques designed to prevent?
What are the Exploit Mitigation security control's mitigation techniques designed to prevent?A . Packed file executionB . Misbehaving applicationsC . File-less attacksD . Rootkit downloadsView AnswerAnswer: D
Which SES security control protects against threats that may occur in the Impact phase?
Which SES security control protects against threats that may occur in the Impact phase?A . Device ControlB . IPSC . AntimalwareD . FirewallView AnswerAnswer: D
Which two (2) options is an administrator able to use to prevent a file from being fasely detected (Select two)
Which two (2) options is an administrator able to use to prevent a file from being fasely detected (Select two)A . Assign the file a SHA-256 cryptographic hashB . Add the file to a Whitelist policyC . Reduce the Intensive Protection setting of the Antimalware policyD . Register the file...
What version number is assigned to a duplicated policy?
What version number is assigned to a duplicated policy?A . OneB . ZeroC . The original policy's number plus oneD . The original policy's version numbView AnswerAnswer: C