Which software category is most likely to cause a conflict with the Traps agent?

Which software category is most likely to cause a conflict with the Traps agent?A . Exploit prevention softwareB . Web browser softwareC . Web meeting and collaboration softwareD . Full disk encryption softwareView AnswerAnswer: A

January 12, 2021 No Comments READ MORE +

A company is trying to understand which platform can be installed on their environment:

A company is trying to understand which platform can be installed on their environment: Select the three endpoints where Traps can be installed (Choose three).A . Windows 10 LTSB with 2 GB RAM, 500MB free disk space and Intel Core i5 CPUB . Windows 2000 SP4 with 1 GB RAM,...

January 12, 2021 No Comments READ MORE +

What is the most likely cause of the issue?

A company is using a Web Gateway/Proxy for all outbound connections. The company has deployed Traps within the domain and in testing, discovered that the ESM Servers are unable to communicate with WildFire. All other Traps features are working. What is the most likely cause of the issue?A . The...

January 11, 2021 No Comments READ MORE +

Once an administrator has successfully instated a Content Update, how is the Content Update applied to endpoint?

Once an administrator has successfully instated a Content Update, how is the Content Update applied to endpoint?A . After Installation on the ESM, an Agent License renewal is required in order to trigger relevant updates.B . After installation on the ESM, relevant updates occur at the next Heartbeat communication from...

January 10, 2021 No Comments READ MORE +

Which version of .NET Framework is required as a prerequisite when installing Traps agent on Windows 7?

Which version of .NET Framework is required as a prerequisite when installing Traps agent on Windows 7?A . .NET Framework 4.5B . .NET Framework 3.5.1C . .NET Framework 2.0D . .NET Framework 4.0View AnswerAnswer: B

January 8, 2021 No Comments READ MORE +

Which certificate can be imported on the endpoint to solve this issue?

During installation of the ESM and the agent, SSL was enabled on an endpoint. However, the agent communication is failing. The services.log on the endpoint has the following error. *An error occurred while making the HTTP request to https: //hostname:2125/CyveraServer/. This could be due to the fact that the server...

January 6, 2021 No Comments READ MORE +

Which policy can be created to assure that Internet Explorer can only run from the Program Files Internet Explorer directory?

An administrator is concerned about rogue installs of Internet Explorer. Which policy can be created to assure that Internet Explorer can only run from the Program Files Internet Explorer directory?A . An execution path policy to blacklist iexplore.exe, and whitelist entry for %programfiles%iexplore.exeB . An execution path policy to blacklist...

January 4, 2021 No Comments READ MORE +

Which behavior will result?

A customer plans to test the malware prevention capabilities of Traps. It has defined this policy. - Local analysis is enabled - Quarantining of malicious files is enabled - Files are to be uploaded to WildFire No executables have been whitelisted or blacklisted in the ESM Console Hash Control screen....

January 2, 2021 No Comments READ MORE +

How can an administrator permit powershell.exe to execute ipconfig.exe without altering the rest of the blacklist?

Assume a Child Process Protection rule exists for powershell.exe in Traps v 4.0. Among the items on the blacklist is ipconfig.exe. How can an administrator permit powershell.exe to execute ipconfig.exe without altering the rest of the blacklist?A . add ipconfig.exe to the Global Child Processes Whitelist, under Restriction settings.B ....

December 31, 2020 No Comments READ MORE +

Which two enhanced key usage purposes are necessary when creating an SSL certificate for an ESM server? (Choose two.)

Which two enhanced key usage purposes are necessary when creating an SSL certificate for an ESM server? (Choose two.)A . File RecoveryB . Server AuthenticationC . Client AuthenticationD . Key RecoveryView AnswerAnswer: B,C

December 30, 2020 No Comments READ MORE +