EXAM 2026/2027: 100% Verified
Questions & Correct Answers
Question 1: A company is deploying Sophos Central Endpoint Protection across 500 Windows
workstations. The security team needs to configure a policy that blocks all unsigned executables
while allowing specific business-critical applications signed with an internal certificate. Which
Sophos Central feature should be configured?
A. Application Control with SHA-256 hash allowlisting
B. Sophos Central Intercept X with machine learning
C. Synchronized Application Control with certificate-based rules
D. Windows Defender Application Control integration
Correct Answer: C
Rationale: Synchronized Application Control allows certificate-based rules that can block unsigned
executables while permitting applications signed with specific internal certificates, providing the
granular control needed for this scenario.
Question 2: During a Sophos Firewall deployment, an engineer notices that IPS policies are not
triggering alerts for known attack signatures. The firewall is running SFOS 20.0 with a valid
subscription. What is the most likely cause?
A. IPS is not enabled globally on the firewall
B. The IPS policy is not applied to the correct firewall rule
C. The firewall is in monitoring mode only
D. The IPS subscription has expired
,Correct Answer: B
Rationale: IPS policies must be applied to specific firewall rules to inspect traffic. Even with IPS
enabled globally, the policy won't trigger unless it's applied to the relevant firewall rules processing
the traffic.
Question 3: An organization using Sophos Central Firewall Management needs to implement a
Zero Trust Network Access (ZTNA) policy for remote users accessing internal applications. Which
component should be configured first?
A. Sophos Central Firewall Management policies
B. Sophos ZTNA gateways and application definitions
C. SD-WAN profiles
D. SSL VPN configurations
Correct Answer: B
Rationale: ZTNA implementation requires configuring ZTNA gateways and defining applications that
will be accessible through the ZTNA policy before creating access policies or configuring other
network components.
Question 4: A Sophos administrator is troubleshooting high CPU usage on a Sophos Firewall XG
430. Investigation shows that SSL/TLS inspection is consuming excessive resources. Which
configuration change would most effectively reduce CPU load while maintaining security?
A. Disable SSL/TLS inspection entirely
B. Exclude trusted categories from SSL inspection
C. Reduce the number of firewall rules
D. Enable hardware acceleration for SSL inspection
Correct Answer: B
, Rationale: Excluding trusted categories (like banking or government) from SSL inspection reduces
CPU load while maintaining security for unknown or risky traffic, providing the best balance of
performance and protection.
Question 5: An enterprise is implementing Sophos Synchronized Security between their
Central-managed endpoints and firewalls. They want to ensure that when an endpoint detects
malware, the firewall automatically isolates the affected device. Which feature should be
configured?
A. Security Heartbeat with automatic isolation
B. Sophos Central Orchestration
C. STIX/TAXII integration
D. SIEM connector with SOAR playbooks
Correct Answer: A
Rationale: Security Heartbeat with automatic isolation enables real-time communication between
endpoint and firewall, allowing automatic quarantine of compromised endpoints when threats are
detected.
Question 6: A company needs to configure SSL VPN on Sophos Firewall for 200 remote users with
Active Directory authentication. Users should be able to access only specific internal networks
based on their AD group membership. What is the correct configuration approach?
A. Configure SSL VPN with LDAP authentication and use firewall rules with user groups
B. Set up RADIUS authentication with AD and configure split tunneling
C. Use local users database with manual group assignment
D. Configure SSL VPN without authentication for easier access
Correct Answer: A
Rationale: SSL VPN with LDAP authentication allows AD integration, and firewall rules with user
groups enable network access control based on AD group membership, providing the required
granular access control.