Which default role has the most limited permission in the Integrated Cyber Defense Manager?
Which default role has the most limited permission in the Integrated Cyber Defense Manager?A . Restricted Administrator B. Limited Administrator C. Server Administrator D. Endpoint Console Domain AdministratorView AnswerAnswer: C
Which Firewall Stealth setting prevents OS fingerprinting by sending erroneous OS information back to the attacker?
Which Firewall Stealth setting prevents OS fingerprinting by sending erroneous OS information back to the attacker?A . Disable OS fingerprint profiling B. Disable OS fingerprint detection C. Enable OS fingerprint masqueradi D. Enable OS fingerprint protectionView AnswerAnswer: C
What characterizes an emerging threat in comparison to traditional threat?
What characterizes an emerging threat in comparison to traditional threat?A . Emerging threats use new techniques and 0-day vulnerability to propagate. B. Emerging threats requires artificial intelligence to be detected. C. Emerging threats are undetectable by signature based engines. D. Emerging threats are more sophisticated than traditional threats.View AnswerAnswer: A
What should an administrator know regarding the differences between a Domain and a Tenant in ICDm?
What should an administrator know regarding the differences between a Domain and a Tenant in ICDm?A . A tenant can contain multiple domains B. A domain can contain multiple tenants C. Each customer can have one domain and many tenant D. Each customer can have one tenant and many domainsView...
Which SEPM-generated element is required for an administrator to complete the enrollment of SEPM to the cloud console?
Which SEPM-generated element is required for an administrator to complete the enrollment of SEPM to the cloud console?A . Token B. SEPM password C. Certificate key pair D. SQL passwordView AnswerAnswer: A
Which device page should an administrator view to track the progress of an issued device command?
Which device page should an administrator view to track the progress of an issued device command?A . Command Status B. Command History C. Recent Activity D. Activity UpdateView AnswerAnswer: C
Which type of organization is likely to be targeted with emerging threats?
Which type of organization is likely to be targeted with emerging threats?A . Small organization with externalized managed security B. Large organizations with dedicated security teams C. Large organization with high turnover D. Small organization with little qualified staffView AnswerAnswer: D
Which URL is responsible for notifying the SES agent that a policy change occurred in the cloud console?
Which URL is responsible for notifying the SES agent that a policy change occurred in the cloud console?A . spoc.norton.com B. stnd-ipsg.crsi-symantec.com C. ent-shasta.rrs-symantec.com D. ocsp.digicert.comView AnswerAnswer: D
What should an administrator do to display only high risk files?
An administrator selects the Discovered Items list in the ICDm to investigate a recent surge in suspicious file activity. What should an administrator do to display only high risk files?A . Apply a list control B. Apply a search rule C. Apply a list filter D. Apply a search modifierView...
Which rule types should be at the bottom of the list when an administrator adds device control rules?
Which rule types should be at the bottom of the list when an administrator adds device control rules?A . General "catch all" rules B. General "brand defined" rules C. Specific "device type" rules D. Specific "device model" rulesView AnswerAnswer: D