PACK KEY FIREWALL AND ENDPOINT SECURITY
CONCEPTS WITH SAMPLE QUESTIONS
◉ Exploit technique detection. Answer: Which feature of intercept X
is designed to detect malware before it can execute?
◉ Data loss prevention rule. Answer: You want to change an action
for 'confidential' content. Where in Sophos Central do you make this
change
◉ False. Answer: Base policies can be disabled in Sophos Central.
◉ Threat Protection. Answer: You are detecting low-reputation files
and want to change the reputation level from recommended to
strict. Which policy do you edit to make this change?
◉ Threat protection. Answer: Which endpoint protection policy
protects users against malicious network traffic?
◉ True. Answer: TRUE or FALSE: Tamper protection must be
disabled before removing Endpoint protection.
, ◉ Web Control. Answer: Which endpoint protection policy do you
edit to block users from visiting a specific website category?
◉ Threat Protection. Answer: Which endpoint protection policy
block access to malicious websites?
◉ False. Answer: TRUE or FALSE: All Endpoints have the same
endpoint password.
◉ Application Control. Answer: Which feature allows you to restrict
application?
◉ Check system requirement. Answer: What is the first step you
must take when deploying virtual environments?
◉ Servers or server group. Answer: Server policies are only applied
to ....
◉ Files and registry entries. Answer: Which 2 of the following are
monitored when File Integrity Monitoring is enabled?
◉ SVM (Security Virtual Machine) & Guest Virtual Machine (GVM).
Answer: Which 2 components are required for protecting virtual
environments?