A user downloads and opens a PDF file with Adobe Acrobat. Unknown to the user, a hidden script in the file begins downloading a RAT.
Which Anti-malware engine recognizes that this behavior is inconsistent with normal Acrobat functionality, blocks the behavior and kills Acrobat?
A. SONAR
B. Sapient
C. IPS
D. Emulator
What must an administrator check prior to enrolling an on-prem SEPM infrastructure into the cloud?
A. Clients are running SEP 14.2 or later
B. Clients are running SEP 14.1.0 or later
C. Clients are running SEP 12-6 or later
D. Clients are running SEP 14.0.1 or late
Which option should an administrator utilize to temporarily or permanently block a file?
A. Delete
B. Hide
C. Encrypt
D. Blacklist
Which two (2) skill areas are critical to the success of incident Response Teams (Select two)
A. Project Management
B. Incident Management
C. Cyber Intelligence
D. Incident Response
E. Threat Analysis
What does an end-user receive when an administrator utilizes the Invite User feature to distribute the SES client?
A. An email with a link to directly download the SES client
B. An email with a link to a KB article explaining how to install the SES Agent
C. An email with the SES_setup.zip file attached
D. An email with link to register on the ICDm user portal
An administrator needs to create a new Report Template that will be used to track firewall activity. Which two (2) report template settings are optional? (Select 2)
A. Output format
B. Generation schedule
C. Email recipients
D. Time frame
E. Size restrictions
Which security control is complementary to IPS, providing a second layer of protection against network attacks?
A. Host Integrity
B. Antimalware
C. Firewall
D. Network Protection
What happens when an administrator blacklists a file?
A. The file is assigned to the Blacklist task list
B. The file is automatically quarantined
C. The file is assigned to a chosen Blacklist policy
D. The file is assigned to the default Blacklist policy
Which two (2) Discovery and Deploy features could an administrator use to enroll MAC endpoints? (Select two)
A. Push Enroll
B. A custom Installation package creator pact
C. A default Direct Installation package
D. Invite User
E. A custom Direct installation package
Which Antimalware technology is used after all local resources have been exhausted?
A. Sapient
B. ITCS
C. Emulator
D. Reputation