Which two (2) steps should an administrator take to guard against re-occurring threats? (Select two)
Which two (2) steps should an administrator take to guard against re-occurring threats? (Select two)A . Confirm that daily active and weekly full scans take place on all endpoints B. Verify that all endpoints receive scheduled Live-Update content C. Use Power Eraser to clean endpoint Windows registries D. Add endpoints...
Which computer meets the pre-requisites for the SES client?
An administrator is evaluating an organization's computers for an upcoming SES deployment. Which computer meets the pre-requisites for the SES client?A . A computer running Mac OS X 10.8 with 500 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor B. A computer...
Which Anti-malware technology should an administrator utilize to expose the malicious nature of a file created with a custom packet?
Which Anti-malware technology should an administrator utilize to expose the malicious nature of a file created with a custom packet?A . Sandbox B. SONAR C. Reputation D. EmulatorView AnswerAnswer: A
What is the frequency of feature updates with SES and the Integrated Cyber Defense Manager (ICDm)
What is the frequency of feature updates with SES and the Integrated Cyber Defense Manager (ICDm)A . Monthly B. Weekly C. Quarterly D. Bi-monthlyView AnswerAnswer: B
Which SES security control protects against threats that may occur in the Impact phase?
Which SES security control protects against threats that may occur in the Impact phase?A . Device Control B. IPS C. Antimalware D. FirewallView AnswerAnswer: D
Which area of the management console is able to have access restricted or granted?
An administrator must create a custom role in ICDm. Which area of the management console is able to have access restricted or granted?A . Policy Management B. Hybrid device management C. Agent deployment D. Custom Dashboard CreationView AnswerAnswer: C
Which technique randomizes the e memory address map with Memory Exploit Mitigation?
Which technique randomizes the e memory address map with Memory Exploit Mitigation?A . SEHOP B. ROPHEAP C. ASLR D. ForceDEPView AnswerAnswer: C
Which Endpoint > Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?
Which Endpoint > Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?A . Discover Endpoints B. Endpoint Enrollment C. Discover and Deploy D. Device DiscoveryView AnswerAnswer: A
What happens to the new version of the policy if the administrator declines the option to apply it?
After editing and saving a policy, an administrator is prompted with the option to apply the edited policy to any assigned device groups. What happens to the new version of the policy if the administrator declines the option to apply it?A . The policy display is returned to edit mode...
What must an administrator check prior to enrolling an on-prem SEPM infrastructure into the cloud?
What must an administrator check prior to enrolling an on-prem SEPM infrastructure into the cloud?A . Clients are running SEP 14.2 or later B. Clients are running SEP 14.1.0 or later C. Clients are running SEP 12-6 or later D. Clients are running SEP 14.0.1 or lateView AnswerAnswer: D