Which two (2) steps should an administrator take to guard against re-occurring threats? (Select two)

Which two (2) steps should an administrator take to guard against re-occurring threats? (Select two)A . Confirm that daily active and weekly full scans take place on all endpoints B. Verify that all endpoints receive scheduled Live-Update content C. Use Power Eraser to clean endpoint Windows registries D. Add endpoints...

January 18, 2023 No Comments READ MORE +

Which computer meets the pre-requisites for the SES client?

An administrator is evaluating an organization's computers for an upcoming SES deployment. Which computer meets the pre-requisites for the SES client?A . A computer running Mac OS X 10.8 with 500 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor B. A computer...

January 18, 2023 No Comments READ MORE +

Which Anti-malware technology should an administrator utilize to expose the malicious nature of a file created with a custom packet?

Which Anti-malware technology should an administrator utilize to expose the malicious nature of a file created with a custom packet?A . Sandbox B. SONAR C. Reputation D. EmulatorView AnswerAnswer: A

January 17, 2023 No Comments READ MORE +

What is the frequency of feature updates with SES and the Integrated Cyber Defense Manager (ICDm)

What is the frequency of feature updates with SES and the Integrated Cyber Defense Manager (ICDm)A . Monthly B. Weekly C. Quarterly D. Bi-monthlyView AnswerAnswer: B

January 17, 2023 No Comments READ MORE +

Which SES security control protects against threats that may occur in the Impact phase?

Which SES security control protects against threats that may occur in the Impact phase?A . Device Control B. IPS C. Antimalware D. FirewallView AnswerAnswer: D

January 16, 2023 No Comments READ MORE +

Which area of the management console is able to have access restricted or granted?

An administrator must create a custom role in ICDm. Which area of the management console is able to have access restricted or granted?A . Policy Management B. Hybrid device management C. Agent deployment D. Custom Dashboard CreationView AnswerAnswer: C

January 15, 2023 No Comments READ MORE +

Which technique randomizes the e memory address map with Memory Exploit Mitigation?

Which technique randomizes the e memory address map with Memory Exploit Mitigation?A . SEHOP B. ROPHEAP C. ASLR D. ForceDEPView AnswerAnswer: C

January 15, 2023 No Comments READ MORE +

Which Endpoint > Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?

Which Endpoint > Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?A . Discover Endpoints B. Endpoint Enrollment C. Discover and Deploy D. Device DiscoveryView AnswerAnswer: A

January 14, 2023 No Comments READ MORE +

What happens to the new version of the policy if the administrator declines the option to apply it?

After editing and saving a policy, an administrator is prompted with the option to apply the edited policy to any assigned device groups. What happens to the new version of the policy if the administrator declines the option to apply it?A . The policy display is returned to edit mode...

January 14, 2023 No Comments READ MORE +

What must an administrator check prior to enrolling an on-prem SEPM infrastructure into the cloud?

What must an administrator check prior to enrolling an on-prem SEPM infrastructure into the cloud?A . Clients are running SEP 14.2 or later B. Clients are running SEP 14.1.0 or later C. Clients are running SEP 12-6 or later D. Clients are running SEP 14.0.1 or lateView AnswerAnswer: D

January 14, 2023 No Comments READ MORE +