In the Data Loss Prevention Rule
You want to change an action for 'confidential' content.
Where in Sophos Central do you make this
... [Show More] change?
Modifying protection settings and uninstalling the endpoint agent
Two of the following that tamper protection prevent users from doing
Installed components
An endpoint is reporting that Sophos Autoupdate is not installed.
In the Self-Help Tool which tab do you check to view whether AutoUpdate is listed as Installed?
Threat Protection
In which policy do you enable device isolation?
To connect Sophos security solutions in real time
What is the function of Sophos Synchronized Security?
Super Admin
What is the minimum administrative role that will allow a user to manage user roles and role assignments
previously detected malware characteristics
Signature-based file scanning relies on....
Help desk
Minimum administrative role that will allow a user to scan endpoints
True
Tamper protection is enabled by default
Exclusions tab and global settings
2 places in Sophos Central do you add exclusions for servers?
Threat Protection
You want to mitigate exploits in vulnerable applications.
Which policy do you enable the features in?
Download and run the installer from Sophos Central
A method of deploying endpoint protection?
Machine learning
Is a pre-execution check performed by Intercept X?
Exploit technique detection
Which feature of Intercept X is designed to detect malware before it can execute?
Policy Enforced
You have created a new policy
Which tab do you select to enable the policy?
Ransomware
Which security threat does Intercept X protect against?
Admin
What is the minimum administrative role that will allow a user to create and edit policies
True
When protecting a Mac client, you must know the password of the administrator
Check the system requirements
What is the first step you must take when deploying virtual environments?
8190
Which TCP port is used to communicate policies to endpoints?
True
Tamper protection must be disabled before removing Endpoint Protection.
Files and Registry Entries
Two of the following are monitored when File Integrity Monitoring is enabled
Web control
Which endpoint protection policy do you edit to block users from visiting a specific website category
Give the user administrator rights to the endpoint and provide the user with the tamper protection password
You need to give a user access to change their protection settings in an emergency
Which 2 of the following allow you to do this? [Show Less]