Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

An administrator needs to create a new Report Template that will be used to track firewall activity. Which two (2) report template settings are optional? (Select 2)

A.

Output format

B.

Generation schedule

C.

Email recipients

D.

Time frame

E.

Size restrictions

An administrator must create a custom role in ICDm.

Which area of the management console is able to have access restricted or granted?

A.

Policy Management

B.

Hybrid device management

C.

Agent deployment

D.

Custom Dashboard Creation

What option must an administrator choose when rolling back a policy assignment to a previous version?

A.

Customize

B.

Reverse

C.

Override

D.

Go Back

A user downloads and opens a PDF file with Adobe Acrobat. Unknown to the user, a hidden script in the file begins downloading a RAT.

Which Anti-malware engine recognizes that this behavior is inconsistent with normal Acrobat functionality, blocks the

behavior and kills Acrobat?

A.

SONAR

B.

Sapient

C.

IPS

D.

Emulator

Which designation should an administrator assign to the computer configured to find unmanaged devices?

A.

Discovery Broker

B.

Discovery Agent

C.

Discovery Manager

D.

Discovery Device

Which file property does SES utilize to search the VirusTotal website for suspicious file information?

A.

File reputation

B.

File size

C.

File name

D.

File hash

What does SES's advanced search feature provide when an administrator searches for a specific term?

A.

A search modifier dialog

B.

A search wizard dialog

C.

A suggested terms dialog

D.

A search summary dialog

What characterizes an emerging threat in comparison to traditional threat?

A.

Emerging threats use new techniques and 0-day vulnerability to propagate.

B.

Emerging threats requires artificial intelligence to be detected.

C.

Emerging threats are undetectable by signature based engines.

D.

Emerging threats are more sophisticated than traditional threats.

Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files. Results in a comparable number of false positives and false negatives."

A.

Level 5

B.

Level 2

C.

Level 1

D.

Level 6

Files are blocked by hash in the blacklist policy.

Which algorithm is supported, in addition to MD5?

A.

SHA256

B.

SHA256 "salted"

C.

MD5 "Salted"

D.

SHA2