Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which SES feature helps administrators apply policies based on specific endpoint profiles?

A.

Policy Bundles

B.

Device Profiles

C.

Policy Groups

D.

Device Groups

What EDR function minimizes the risk of an endpoint infecting other resources in the environment?

A.

Quarantine

B.

Block

C.

Deny List

D.

Firewall

What characterizes an emerging threat in comparison to the traditional threat?

A.

Emerging threats are more sophisticated than traditional threats.

B.

Emerging threats require artificial intelligence to be detected.

C.

Emerging threats are undetectable by signature-based engines.

D.

Emerging threats use new techniques and 0-day vulnerability to propagate.

Files are blocked by hash in the deny list policy. Which algorithm is supported, in addition to MD5?

A.

SHA2

B.

SHA256

C.

SHA256 "salted"

D.

MD5 "Salted"

What happens when a device fails a Host Integrity check?

A.

An antimalware scan is initiated

B.

The device is restarted

C.

The device is quarantined

D.

An administrative notification is logged