What attack vectors are protected by using the SandBlast Agent?

What attack vectors are protected by using the SandBlast Agent?A . Mail, Web, Office 365B . Outside the office, removable media, lateral movementC . Office 365, Outside of the office, removable media, lateral movementD . email, Lateral movement, Removable media, encrypted channelsView AnswerAnswer: B

June 18, 2019 No Comments READ MORE +

Please Answer Questions Follow The Prompts Below

MTAA . 1 and 3 are correctB . 1, 2, and 3 are correctC . 1 and 2 are correctD . 2 and 3 are correctView AnswerAnswer: A

June 11, 2019 No Comments READ MORE +

Please Answer Questions Follow The Prompts Below

MTAA . 1 and 3 are correctB . 1, 2, and 3 are correctC . 1 and 2 are correctD . 2 and 3 are correctView AnswerAnswer: A

June 10, 2019 No Comments READ MORE +

Which Blades of the SandBlast Agent are used for remediation?

Which Blades of the SandBlast Agent are used for remediation?A . DLP and Compliance bladesB . Anti-Bot blade and Threat Emulation bladesC . Forensics and Threat Emulation bladesD . Threat Emulation and Threat Extraction BladesView AnswerAnswer: C

June 10, 2019 No Comments READ MORE +

You can restrict a user from downloading an original file if it is getting a malicious verdict from Threat Emulation?

You can restrict a user from downloading an original file if it is getting a malicious verdict from Threat Emulation?A . True C This is possible through the SmartDashboard Threat extraction settings.B . False C Due to security concerns, a user will never be able to download a file found...

June 5, 2019 No Comments READ MORE +

You can restrict a user from downloading an original file if it is getting a malicious verdict from Threat Emulation?

You can restrict a user from downloading an original file if it is getting a malicious verdict from Threat Emulation?A . True C This is possible through the SmartDashboard Threat extraction settings.B . False C Due to security concerns, a user will never be able to download a file found...

May 28, 2019 No Comments READ MORE +

With regard to SandBlast Cloud emulation, which statement is INCORRECT?

With regard to SandBlast Cloud emulation, which statement is INCORRECT?A . SandBlast Cloud licensing offers fair usage caps which customers should never reach.B . SandBlast Cloud licensing requires a license SKU per gateway.C . Only new files not seen before are emulated on the cloud and count against fair usage...

May 26, 2019 No Comments READ MORE +

Which of the following is FALSE about the SandBlast Agent capabilities?

Which of the following is FALSE about the SandBlast Agent capabilities?A . Stop data exfiltration to prevent disclosure of sensitive information, and quarantine infected systems to limit spread of malware.B . Detect and block command and control communications, even when working remotely.C . Connect to remote offices via virtual private...

May 24, 2019 No Comments READ MORE +

You can restrict a user from downloading an original file if it is getting a malicious verdict from Threat Emulation?

You can restrict a user from downloading an original file if it is getting a malicious verdict from Threat Emulation?A . True C This is possible through the SmartDashboard Threat extraction settings.B . False C Due to security concerns, a user will never be able to download a file found...

May 23, 2019 No Comments READ MORE +

What’s the password for the encrypted malicious file available via the Threat Emulation forensics report?

What’s the password for the encrypted malicious file available via the Threat Emulation forensics report?A . maliciousB . forensicsC . passwordD . infectedView AnswerAnswer: C

May 19, 2019 No Comments READ MORE +