What are two (2) benefits of a fully cloud managed endpoint protection solution? (Select two)
Which two (2) steps should an administrator take to guard against re-occurring threats? (Select two)
Which URL is responsible for notifying the SES agent that a policy change occurred in the cloud console?
An administrator must create a custom role in ICDm.
Which area of the management console is able to have access restricted or granted?
Which technique randomizes the e memory address map with Memory Exploit Mitigation?
Files are blocked by hash in the blacklist policy.
Which algorithm is supported, in addition to MD5?
Which term or expression is utilized when adversaries leverage existing tools in the environment?
Which report template includes a summary of risk distribution by devices, users, and groups?
Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files. Results in a comparable number of false positives and false negatives."
An endpoint is offline, and the administrator issues a scan command. What happens to the endpoint when it restarts, if it lacks connectivity?