Which type of security threat is used by attackers to exploit vulnerable applications?
Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files. Results in a comparable number of false positives and false negatives."
What characterizes an emerging threat in comparison to traditional threat?
An administrator must create a custom role in ICDm.
Which area of the management console is able to have access restricted or granted?
A user downloads and opens a PDF file with Adobe Acrobat. Unknown to the user, a hidden script in the file begins downloading a RAT.
Which Anti-malware engine recognizes that this behavior is inconsistent with normal Acrobat functionality, blocks the
behavior and kills Acrobat?
An administrator selects the Discovered Items list in the ICDm to investigate a recent surge in suspicious file activity. What should an administrator do to display only high risk files?
Which technique randomizes the e memory address map with Memory Exploit Mitigation?
An endpoint is offline, and the administrator issues a scan command. What happens to the endpoint when it restarts, if it lacks connectivity?
What are the Exploit Mitigation security control's mitigation techniques designed to prevent?
Which SES feature helps administrator apply policies based on specific endpoint profiles?