Which two (2) steps should an administrator take to guard against re-occurring threats? (Select two)

Which two (2) steps should an administrator take to guard against re-occurring threats? (Select two)
A . Confirm that daily active and weekly full scans take place on all endpoints
B. Verify that all endpoints receive scheduled Live-Update content
C. Use Power Eraser to clean endpoint Windows registries
D. Add endpoints to a high security group and assign a restrictive Antimalware policy to the group
E. Quarantine affected endpoints

Answer: C,E

Which computer meets the pre-requisites for the SES client?

An administrator is evaluating an organization’s computers for an upcoming SES deployment.

Which computer meets the pre-requisites for the SES client?
A . A computer running Mac OS X 10.8 with 500 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor
B. A computer running Mac OS X 10.14 with 400 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor
C. A computer running Windows 10 with 400 MB of disk space, 2 GB of RAM, and a 2.4 GHz Intel Pentium 4 processor
D. A computer running Windows 8 with 380 MB of disk space, 2 GB of RAM, and a 2.8 GHz Intel Pentium 4 processor

Answer: C

What happens to the new version of the policy if the administrator declines the option to apply it?

After editing and saving a policy, an administrator is prompted with the option to apply the edited policy to any assigned device groups.

What happens to the new version of the policy if the administrator declines the option to apply it?
A . The policy display is returned to edit mode
B. The new version of the policy is deleted
C. An unassigned version of the policy is created
D. The new version of the policy is added to the "in progress" list

Answer: A