reviewer 2024 Questions and Answers
In the Data Loss Prevention Rule - Answer- You want to change an action for
'confidential' content.
Where in Sophos Central do you make this change?
Modifying protection settings and uninstalling the endpoint agent - Answer- Two of the
following that tamper protection prevent users from doing
Installed components - Answer- An endpoint is reporting that Sophos Autoupdate is not
installed.
In the Self-Help Tool which tab do you check to view whether AutoUpdate is listed as
Installed?
Threat Protection - Answer- In which policy do you enable device isolation?
To connect Sophos security solutions in real time - Answer- What is the function of
Sophos Synchronized Security?
Super Admin - Answer- What is the minimum administrative role that will allow a user to
manage user roles and role assignments
previously detected malware characteristics - Answer- Signature-based file scanning
relies on....
Help desk - Answer- Minimum administrative role that will allow a user to scan
endpoints
True - Answer- Tamper protection is enabled by default
Exclusions tab and global settings - Answer- 2 places in Sophos Central do you add
exclusions for servers?
Threat Protection - Answer- You want to mitigate exploits in vulnerable applications.
Which policy do you enable the features in?
Download and run the installer from Sophos Central - Answer- A method of deploying
endpoint protection?
, Machine learning - Answer- Is a pre-execution check performed by Intercept X?
Exploit technique detection - Answer- Which feature of Intercept X is designed to detect
malware before it can execute?
Policy Enforced - Answer- You have created a new policy
Which tab do you select to enable the policy?
Ransomware - Answer- Which security threat does Intercept X protect against?
Admin - Answer- What is the minimum administrative role that will allow a user to create
and edit policies
True - Answer- When protecting a Mac client, you must know the password of the
administrator
Check the system requirements - Answer- What is the first step you must take when
deploying virtual environments?
8190 - Answer- Which TCP port is used to communicate policies to endpoints?
True - Answer- Tamper protection must be disabled before removing Endpoint
Protection.
Files and Registry Entries - Answer- Two of the following are monitored when File
Integrity Monitoring is enabled
Web control - Answer- Which endpoint protection policy do you edit to block users from
visiting a specific website category
Give the user administrator rights to the endpoint and provide the user with the tamper
protection password - Answer- You need to give a user access to change their
protection settings in an emergency
Which 2 of the following allow you to do this?
To prevent the use of removable media on protected endpoints - Answer- What is the
function of Peripheral Control?
False - Answer- Deleting an endpoint Sophos Central will remove the Endpoint agent
from the endpoint.
To detect and stop compromised vulnerable applications - Answer- What is the function
of anti-exploit technology?