What is the frequency of feature updates with SES and the Integrated Cyber Defense Manager (ICDm)
A. Monthly
B. Weekly
C. Quarterly
D. Bi-monthly
A user downloads and opens a PDF file with Adobe Acrobat. Unknown to the user, a hidden script in the file begins downloading a RAT.
Which Anti-malware engine recognizes that this behavior is inconsistent with normal Acrobat functionality, blocks the behavior and kills Acrobat?
A. SONAR
B. Sapient
C. IPS
D. Emulator
What must an administrator check prior to enrolling an on-prem SEPM infrastructure into the cloud?
A. Clients are running SEP 14.2 or later
B. Clients are running SEP 14.1.0 or later
C. Clients are running SEP 12-6 or later
D. Clients are running SEP 14.0.1 or late
Which security control is complementary to IPS, providing a second layer of protection against network attacks?
A. Host Integrity
B. Antimalware
C. Firewall
D. Network Protection
An administrator suspects that several computers have become part of a botnet. What should the administrator do to detect botnet activity on the network?
A. Enable the Command and Control Server Firewall
B. Add botnet related signatures to the IPS policy's Audit Signatures list
C. Enable the IPS policy's Show notification on the device setting
D. Set the Antimalware policy's Monitoring Level to 4
Which SES feature helps administrator apply policies based on specific endpoint profiles?
A. Device Groups
B. Device Profiles
C. Policy Bundles
D. Policy Groups
Which two (2) Discovery and Deploy features could an administrator use to enroll MAC endpoints? (Select two)
A. Push Enroll
B. A custom Installation package creator pact
C. A default Direct Installation package
D. Invite User
E. A custom Direct installation package
The ICDm has generated a blacklist task due to malicious traffic detection. Which SES component was utilized to make that detection?
A. Antimalware
B. Reputation
C. Firewall
D. IPS
Which term or expression is utilized when adversaries leverage existing tools in the environment?
A. opportunistic attack
B. script kiddies
C. living off the land
D. file-less attack
Why would an administrator choose the Server-optimized installation option when creating an installation package?
A. To limit the Intrusion Prevention policy to use server-only signatures.
B. To add the Server-optimized Firewall policy
C. To add the SES client's Optimize Memory setting to the default server installation.
D. To reduce the SES client's using resources that are required for other server-specific processes.