100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

Sophos Engineer Exam Questions With 100% Correct Answers

Puntuación
-
Vendido
-
Páginas
7
Grado
A+
Subido en
15-05-2024
Escrito en
2023/2024

Sophos Engineer Exam Questions With 100% Correct Answers You have cloned the threat protection base policy, applied the policy to a group and saved it. When checking the endpoint, the policy changes have not taken effect. What do you check in the policy - answerThat the cloned policy has been enforced Which TCP port is used to communicate policies to endpoint? - answer8190 What is the function of an update cache? - answerTo download updates from Sophos Central and store them on a dedicated server on your network Which of the following is a method of deploying endpoint protection? - answerDownload and run the installer from Sophos Central Which TCP port is used to communicate Updates on endpoint? - answer8191 A message relay can be configured on a Server without an Update Cache. - answerFalse When protecting a MAC client, you must know the password of the administrator. - answerTrue What is the function of live protection? - answerConnects to a cloud server to check for the latest information about a file Which is the function of Application control? - answerTo block specific applications from running on protected endpoints What is the function of Sophos Synchronized Security? - answerTo connect Sophos security solutions in real time What is the function of Web Control? - answerControl access to websites based on their category What is the function of anti-exploit technology? - answerTo detect and stop compromised vulnerable applications Which feature of intercept X is designed to detect malware before it can execute? - answerExploit technique detection You want to change an action for 'confidential' content. Where in Sophos Central do you make this change - answerData loss prevention rule Base policies can be disabled in Sophos Central. - answerFalse You are detecting low-reputation files and want to change the reputation level from recommended to strict. Which policy do you edit to make this change? - answerThreat Protection Which endpoint protection policy protects users against malicious network traffic? - answerThreat protection TRUE or FALSE: Tamper protection must be disabled before removing Endpoint protection. - answerTrue Which endpoint protection policy do you edit to block users from visiting a specific website category? - answerWeb Control Which endpoint protection policy block access to malicious websites? - answerThreat Protection TRUE or FALSE: All Endpoints have the same endpoint password. - answerFalse Which feature allows you to restrict application? - answerApplication Control What is the first step you must take when deploying virtual environments? - answerCheck system requirement Server policies are only applied to .... - answerServers or server group Which 2 of the following are monitored when File Integrity Monitoring is enabled? - answerFiles and registry entries Which 2 components are required for protecting virtual environments? - answerSVM (Security Virtual Machine) & Guest Virtual Machine (GVM) A Windows endpoint installation is failing. It is detecting competitor software. Which log file do you check to investigate this issue? - answerA Which log provides a record of all activities? - answerAudit log For most detections, which clean-up process is used to clean up the detection? - answerAutomatic Clean up A malicious file has been detected on an endpoint and you want to prevent lateral movement through your network. From the threat case, which action do you take? - answerIsolate the computer You want to check an endpoint has received the latest policy updates from Sophos Central. Which tab do you select in the Endpoint Self-Help tool to view the last communication date and time? - answerManagement Communications

Mostrar más Leer menos
Institución
Sophos
Grado
Sophos









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Sophos
Grado
Sophos

Información del documento

Subido en
15 de mayo de 2024
Número de páginas
7
Escrito en
2023/2024
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

Sophos Engineer E xam Questions With 100% Correct Answers You have cloned the threat protection base policy, applied the policy to a group and saved it. When checking the endpoint, the policy changes have not taken effect. What do you check in the policy - answer✔✔That the clone d policy has been enforced Which TCP port is used to communicate policies to endpoint? - answer✔✔8190 What is the function of an update cache? - answer✔✔To download updates from Sophos Central and store them on a dedicated server on your network Which of t he following is a method of deploying endpoint protection? - answer✔✔Download and run the installer from Sophos Central Which TCP port is used to communicate Updates on endpoint? - answer✔✔8191 A message relay can be configured on a Server without an Updat e Cache. - answer✔✔False When protecting a MAC client, you must know the password of the administrator. - answer✔✔True What is the function of live protection? - answer✔✔Connects to a cloud server to check for the latest information about a file Which is t he function of Application control? - answer✔✔To block specific applications from running on protected endpoints What is the function of Sophos Synchronized Security? - answer✔✔To connect Sophos security solutions in real time What is the function of Web C ontrol? - answer✔✔Control access to websites based on their category What is the function of anti -exploit technology? - answer✔✔To detect and stop compromised vulnerable applications Which feature of intercept X is designed to detect malware before it can execute? - answer✔✔Exploit technique detection You want to change an action for 'confidential' content. Where in Sophos Central do you make this change - answer✔✔Data loss prevention rule Base policies can be disabled in Sophos Central. - answer✔✔False You are detecting low -reputation files and want to change the reputation level from recommended to strict. Which policy do you edit to make this change? - answer✔✔Threat Protection Which endpoint protection policy protects users against malicious network traf fic? - answer✔✔Threat protection TRUE or FALSE: Tamper protection must be disabled before removing Endpoint protection. - answer✔✔True Which endpoint protection policy do you edit to block users from visiting a specific website category? - answer✔✔Web Cont rol Which endpoint protection policy block access to malicious websites? - answer✔✔Threat Protection TRUE or FALSE: All Endpoints have the same endpoint password. - answer✔✔False Which feature allows you to restrict application? - answer✔✔Application Contr ol What is the first step you must take when deploying virtual environments? - answer✔✔Check system requirement Server policies are only applied to .... - answer✔✔Servers or server group Which 2 of the following are monitored when File Integrity Monitoring is enabled? - answer✔✔Files and registry entries Which 2 components are required for protecting virtual environments? - answer✔✔SVM (Security Virtual Machine) & Guest Virtual Machine (GVM) A Windows endpoint installation is failing. It is detecting competitor software. Which log file do you check to investigate this issue? - answer✔✔Avremove.log Which log provides a record of all activities? - answer✔✔Audit log For most detections, which cle an-up process is used to clean up the detection? - answer✔✔Automatic Clean up A malicious file has been detected on an endpoint and you want to prevent lateral movement through your network. From the threat case, which action do you take? - answer✔✔Isolate the computer You want to check an endpoint has received the latest policy updates from Sophos Central. Which tab do you select in the Endpoint Self -Help tool to view the last communication date and time? - answer✔✔Management Communications

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
TheStar Florida State University
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
591
Miembro desde
1 año
Número de seguidores
178
Documentos
23587
Última venta
3 días hace
Stuvia Prodigy

Tested, Verified and Updated Study Materials with 100% Guaranteed Success.

3.8

119 reseñas

5
56
4
21
3
21
2
4
1
17

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes