Which two (2) options is an administrator able to use to prevent a file from being fasely detected (Select two)
Which type of security threat is used by attackers to exploit vulnerable applications?
An administrator learns of a potentially malicious file and wants to proactively prevent the file from ever being executed.
What should the administrator do?
Which report template type should an administrator utilize to create a daily summary of network threats detected?
Which two (2) steps should an administrator take to guard against re-occurring threats? (Select two)
What is the primary issue pertaining to managing roaming users while utilizing an on-premise solution?
The ICDm has generated a blacklist task due to malicious traffic detection. Which SES component was utilized to make that detection?
In the ICDm, administrators are assisted by the My Task view. Which automation type creates the tasks within the console?
Which device page should an administrator view to track the progress of an issued device command?
Which Firewall Stealth setting prevents OS fingerprinting by sending erroneous OS information back to the attacker?
Which file should an administrator create, resulting Group Policy Object (GPO)?
Which alert rule category includes events that are generated about the cloud console?
An administrator is evaluating an organization's computers for an upcoming SES deployment. Which computer meets the pre-requisites for the SES client?
Which option should an administrator utilize to temporarily or permanently block a file?
What are two (2) benefits of a fully cloud managed endpoint protection solution? (Select two)
What should an administrator know regarding the differences between a Domain and a Tenant in ICDm?