SOPHOS CERTIFIED ENGINEER | 74 Actual Questions and Answers 100% Correct | Updated
Read - Answer What permissions does the user need to connect to AD to gather the user and group information?
True - Answer TRUE or FALSE: Only PE files can be restored from
SafeStore through the user interface.
Domain user - Answer What is the minimum type of user required to connect to AD to gather the user and group information?
Global settings > Controlled Updates - Answer By default, computers get the latest Sophos product updates automatically, where can an admin change this to allow control over updates?
telnet dc.sophos.local 636 - Answer You want to test the default SSL LDAP port for Active Directory synchronization. Enter the command you would use to verify connectivity to a domain controller named dc.sophos.local. _____
%ProgramData%\sophos\sophos cloud AD sync\logs - Answer Where is the AD sync log location?
nslookup - Answer The Central Admin Dashboard shows that none of your endpoints are using one of your update caches. When pinging the update cache by name it fails. What command do you use to investigate this further?
True - Answer TRUE or FALSE: Tamper Protection is enabled by
default in Sophos Central. 1 / 2
(1) Sophos Endpoint Self Help (2) Sophos Central - Answer Which 2 methods does Sophos provide that will display the status of all Sophos services on Windows computers? Choose two (2).
The connection was blocked but the root cause has NOT been cleaned up - Answer Which of the following statements is TRUE for a C2/Generic-C detection?
Active Directory Sync Utility - Answer Where do you check to see if the AD sync schedule has been configured correctly?
Global Settings - Answer Where can the AD Sync tool be obtained from?
To detect man-in-the-middle attacks - Answer What is the function of Safe Browsing in Intercept X?
(1) Program Data\Sophos\SafeStore (2) Program Data\Sophos\Sophos Anti-Virus\SafeStore - Answer Where can you find the SafeStore quarantine folders on a Windows Endpoint? Choose two (2).
Resolve and verify - Answer What is the third step of the troubleshooting process?
(1) The threat was found in an archive (2) The threat was found in a mailbox - Answer Which 2 of the following are reasons why manual cleanup may be required? Choose two (2).
- / 2