SOPHOS ENGINEER EXAM 2025/2026
QUESTIONS AND ANSWERS 100% PASS
That the cloned policy has been enforced - ANS You have cloned the threat protection base
policy, applied the policy to a group and saved it. When checking the endpoint, the policy
changes have not taken effect. What do you check in the policy
8190 - ANS Which TCP port is used to communicate policies to endpoint?
To download updates from Sophos Central and store them on a dedicated server on your
network - ANS What is the function of an update cache?
Download and run the installer from Sophos Central - ANS Which of the following is a
method of deploying endpoint protection?
8191 - ANS Which TCP port is used to communicate Updates on endpoint?
False - ANS A message relay can be configured on a Server without an Update Cache.
True - ANS When protecting a MAC client, you must know the password of the
administrator.
1 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED
, Connects to a cloud server to check for the latest information about a file - ANS What is the
function of live protection?
To block specific applications from running on protected endpoints - ANS Which is the
function of Application control?
To connect Sophos security solutions in real time - ANS What is the function of Sophos
Synchronized Security?
Control access to websites based on their category - ANS What is the function of Web
Control?
To detect and stop compromised vulnerable applications - ANS What is the function of anti-
exploit technology?
Exploit technique detection - ANS Which feature of intercept X is designed to detect
malware before it can execute?
Data loss prevention rule - ANS You want to change an action for 'confidential' content.
Where in Sophos Central do you make this change
False - ANS Base policies can be disabled in Sophos Central.
Threat Protection - ANS You are detecting low-reputation files and want to change the
reputation level from recommended to strict. Which policy do you edit to make this change?
Threat protection - ANS Which endpoint protection policy protects users against malicious
network traffic?
2 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED
QUESTIONS AND ANSWERS 100% PASS
That the cloned policy has been enforced - ANS You have cloned the threat protection base
policy, applied the policy to a group and saved it. When checking the endpoint, the policy
changes have not taken effect. What do you check in the policy
8190 - ANS Which TCP port is used to communicate policies to endpoint?
To download updates from Sophos Central and store them on a dedicated server on your
network - ANS What is the function of an update cache?
Download and run the installer from Sophos Central - ANS Which of the following is a
method of deploying endpoint protection?
8191 - ANS Which TCP port is used to communicate Updates on endpoint?
False - ANS A message relay can be configured on a Server without an Update Cache.
True - ANS When protecting a MAC client, you must know the password of the
administrator.
1 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED
, Connects to a cloud server to check for the latest information about a file - ANS What is the
function of live protection?
To block specific applications from running on protected endpoints - ANS Which is the
function of Application control?
To connect Sophos security solutions in real time - ANS What is the function of Sophos
Synchronized Security?
Control access to websites based on their category - ANS What is the function of Web
Control?
To detect and stop compromised vulnerable applications - ANS What is the function of anti-
exploit technology?
Exploit technique detection - ANS Which feature of intercept X is designed to detect
malware before it can execute?
Data loss prevention rule - ANS You want to change an action for 'confidential' content.
Where in Sophos Central do you make this change
False - ANS Base policies can be disabled in Sophos Central.
Threat Protection - ANS You are detecting low-reputation files and want to change the
reputation level from recommended to strict. Which policy do you edit to make this change?
Threat protection - ANS Which endpoint protection policy protects users against malicious
network traffic?
2 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED