Which of the following describes the role of a cloud-based Real Protect scanner?
Security operations has recently received indicators of compromise (IOCs) detailing a new piece of malware for which coverage is not available. The threat advisory recommends a list of file paths and registry keys to prevent this new malware from successfully executing. Which of the following ENS 10.5 features should be used to achieve this goal?
For which of the following reasons does ENS 10 store two previous versions of AMCore content?
Which of the following items are sent to the cloud when Real Protect scanning is enabled on endpoints that are connected to the Internet?
An administrator wants to prevent incoming packets until the system reboots fully. Which of the following features should be configured to allow this?
An ENS administrator is configuring on-access protection but finds the trusted backup tool is causing an unneeded performance impact. Which of the following actions should the administrator take?
A user navigates to a website and notices a small blue square around an "M" in the upper-right corner of the Chrome browser. Which of the following does the blue color indicate within the toolbar?
In which of the following locations are the installation log files stored by default on a Windows machine?
After enabling a timed group in the firewall policy, in which of the following ways does the user enable the group?
Organizational security policy requires a host-based firewall on endpoints. Some endpoints have applications where documentation depicting network traffic flows is not readily available. Which of the following ENS 10.5 firewall features should be used to develop rules for their firewall policy?