An administrator needs to create a new Report Template that will be used to track firewall activity. Which two (2) report template settings are optional? (Select 2)
An administrator must create a custom role in ICDm.
Which area of the management console is able to have access restricted or granted?
What option must an administrator choose when rolling back a policy assignment to a previous version?
A user downloads and opens a PDF file with Adobe Acrobat. Unknown to the user, a hidden script in the file begins downloading a RAT.
Which Anti-malware engine recognizes that this behavior is inconsistent with normal Acrobat functionality, blocks the
behavior and kills Acrobat?
Which designation should an administrator assign to the computer configured to find unmanaged devices?
Which file property does SES utilize to search the VirusTotal website for suspicious file information?
What does SES's advanced search feature provide when an administrator searches for a specific term?
What characterizes an emerging threat in comparison to traditional threat?
Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files. Results in a comparable number of false positives and false negatives."
Files are blocked by hash in the blacklist policy.
Which algorithm is supported, in addition to MD5?