Apex One Certified Professional Exam 2023
1 What are some of the limitations of a Security Agent running in Independent Mode? Select all that
... [Show More] apply.
The Security Agent does not initiate scan commands from the Apex One Server.
The Security Agent does not accept policy settings from the Apex One Server.
The Security Agent does not run real-time scans. The Security Agent denies access to shared folders.
2 Which of the following items is NOT required to enable Browser Exploit Protection?
Advanced Protection Service Behavior Monitoring
Web Reputation
Relevant browser plug-in installed
3 Which of the following is NOT a valid Outbreak Prevention Policy option that can be configured by an administrator?
Block Ports
Deny access to executable compressed files Limit/Deny access to shared folders
Limit/Deny access to mapped networked drives
4 Which of the following best describes Assessment Mode in Apex One?
Assessment Mode provides a trial period for evaluating Apex One protection before requiring valid activation codes to be provided.
Assessment Mode allows administrator to maintain visibility of roaming users even when they are not using a VPN connection into the corporate network.
Assessment Mode allows an administrator to evaluate items that Apex One detects as spyware/grayware or to monitor Web site access. When Assessment Mode is enabled, detections are logged only.
Assessment Mode provides a time period where files evaluated by
the Security Agent are submitted to the Predictive Machine Learning model. Submissions provided while in Assessment Mode train the model to identify potential malware for your installation of Apex One.
5 Which of the following is NOT a task performed by the Apex One Server?
Extracts characteristics from files and submits to the Smart Protection network for heuristic analysis.
Distributes protection settings to Security Agents. Installs Security Agents.
Collects suspicious file samples and forwards for analysis.
6 Which of the following items can NOT be deployed using Update Agents?
Software components Security Agents
Hotfixes
Domain settings
7 Which of the following statements regarding File Census in Apex One is FALSE?
Census needs a Smart Protection Server (Integrated or Standalone) in order to work
Census can check for information coming through emails Census is dependent on Behavior Monitoring
Census can check on http and https channels
8 During the installation of the Apex One Server, the Setup Wizard displays a port that will be used for Apex One Server-Agent communication, as displayed in the exhibit. How is this port assigned?
The port assignment is read from an Apex Central configuration file.
A high-numbered port is randomly assigned.
The Setup Wizard does not assign the port; you must type a port number manually.
The Setup Wizard scans ports on the Apex One Server and selects a port that is not being used.
9 By default, how many incremental pattern updates does the Apex One Server make available to the Security Agents?
5
7
10
14
10 Which of the following statements are TRUE regarding Lockdown Mode in Apex One Application Control policies? Select all that apply.
When in Lockdown Mode, Apex One blocks all applications not identified during an inventory scan.
Applications from trusted vendors can be excluded from Lockdown.
When in Lockdown Mode, the endpoint does not permit access to any application that do not specifically match Allow criteria.
When in Lockdown Mode, assessment mode is automatically disabled.
11 A new IP Address Grouping is configured as in the exhibit. The new grouping called Lab is created, but when checking the Agent List, no Agents are displayed in the group even though Agents do exist within the IP address range. Which of the following events will trigger the addition of the Agents to the group? Select all that apply.
Agents will be added to the group when they register to the Server for the first time.
Agents will be added to the group when their connection status changes from offline to online.
Agents will be added to the group when the administrator runs the Sort Client operation.
Agents must be added to the group manually.
12 Which of the following activities will NOT be captured as attacks by Behavior Monitoring in Apex One?
A malicious program modifies Windows shell settings to associate themselves to certain file types, allowing the malicious program to launch automatically when an end-user attempts to open the associated file in Windows Explorer.
A malicious application attempts to replace a system file with another file of the same name.
A malicious program adds or modifies autostart entries in the Windows Registry. This will automatically launch the malicious program when the computer starts.
A malicious program is downloaded from the Web through Internet Explorer or Outlook.
13 Predictive Machine Learning in Apex One can examine files from which of the following channels? Select all that apply.
Files copied from a network share using Windows Explorer
Microsoft Outlook
USB
Selected Web browsers
14 An Apex One Firewall Policy is created, but not a Firewall Profile. What behavior can you expect for the Apex One Firewall?
If a Firewall Profile is not created, the policy settings will only apply to the local computer on which it was created.
If a Firewall Profile is not created, the policy setting will be applied automatically to the most recently created profile.
If a Firewall Profile is not created, the policy settings will not be applied to the Security Agents.
If a Firewall Profile is not created, the policy settings will be applied automatically to all Security Agents.
If a Firewall Profile is not created, the policy settings will not be applied to any Security Agents
15 Which of the following statements regarding the Newly Encountered Programs feature of Behavior Monitoring is FALSE?
The Newly Encountered Program feature requires Real-Time Scan and Web Reputation be enabled.
Behavior Monitoring scans HTTP, HTTPS and email for programs with low prevalence or maturity.
Applications can be added to a white list to bypass the New Encountered Programs feature. This will allow programs to execute regardless of their prevalence and maturity.
End users can be prompted to allow programs with low prevalence or maturity.
16 Which of the following correctly describes the method of deploying an Apex One Edge Relay Server?
Click "Enable Apex One Edge Relay Server" under the Administration Settings in the Apex One Web Management console.
From the target server, run the Edge Relay Server setup application obtained from the Apex One Server.
Click "Enable Apex One Edge Relay Server" during the Apex One Setup Wizard.
Run the Edge Relay Server setup application on the Apex One Server and specify the IP address of the target server when prompted. [Show Less]