Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which tool can you use to query the history.db file?

A.

Curl

B.

FireAMP_Helper.vbs

C.

cscript

D.

SQLite

When a user initiates a scan, which types of scan are available as options?

A.

scheduled scan, thorough scan, quick scan, network scan

B.

jiffy scan, overnight scan, scan when available, vulnerability scan

C.

flash scan, custom scan, full scan

D.

none, because user-initiated scans are not allowed

FireAMP reports can be distributed by which mechanism?

A.

email

B.

cloud sync

C.

Windows file share

D.

a Crystal Reports subscription

When you are viewing information about a computer, what is displayed?

A.

the type of antivirus software that is installed

B.

the internal IP address

C.

when the operating system was installed

D.

the console settings

From the Deployment screen, you can deploy agents via which mechanism?

A.

push to client

B.

.zip install file

C.

user download from Sourcefire website or email

D.

precompiled RPM package

Incident responders use which policy mode for outbreak control?

A.

Audit

B.

Protect

C.

Triage

D.

Emergency

Which FireAMP capability can tell you how malware has spread in a network?

A.

File Analysis

B.

Threat Root Cause

C.

File Trajectory

D.

Heat Map

Which option describes a requirement for using Remote File Fetch?

A.

It must be done from a private cloud console.

B.

It can be done only over port 32137.

C.

The administrator must have two-step authentication enabled.

D.

The feature is integrated into the product, so no specific requirements must be fulfilled.

Which set of actions would you take to create a simple custom detection?

A.

Add a SHA-256 value; upload a file to calculate a SHA-256 value; upload a text file that contains SHA-256 values.

B.

Upload a packet capture; use a Snort rule; use a ClamAV rule.

C.

Manually input the PE header data, the MD-5 hash, and a list of MD-5 hashes.

D.

Input the file and file name.

Advanced custom signatures are written using which type of syntax?

A.

Snort signatures

B.

Firewall signatures

C.

ClamAV signatures

D.

bash shell