Sophos Endpoint and Server - engineer reviewer | 84 Actual Questions and Answers 100% Correct |Updated
In the Data Loss Prevention Rule - Answer You want to change an action for 'confidential' content.
Where in Sophos Central do you make this change?
Modifying protection settings and uninstalling the endpoint agent - Answer Two of the following that tamper protection prevent users from doing
Installed components - Answer An endpoint is reporting that Sophos Autoupdate is not installed.
In the Self-Help Tool which tab do you check to view whether AutoUpdate is listed as Installed?
Threat Protection - Answer In which policy do you enable device isolation?
To connect Sophos security solutions in real time - Answer What is the function of Sophos Synchronized Security?
Super Admin - Answer What is the minimum administrative role that will allow a user to manage user roles and role assignments
previously detected malware characteristics - Answer Signature-based file scanning relies on....
Help desk - Answer Minimum administrative role that will allow a user to scan endpoints
True - Answer Tamper protection is enabled by default
- / 2
Exclusions tab and global settings - Answer 2 places in Sophos Central do you add exclusions for servers?
Threat Protection - Answer You want to mitigate exploits in vulnerable applications.
Which policy do you enable the features in?
Download and run the installer from Sophos Central - Answer A method of deploying endpoint protection?
Machine learning - Answer Is a pre-execution check performed by Intercept X?
Exploit technique detection - Answer Which feature of Intercept X is designed to detect malware before it can execute?
Policy Enforced - Answer You have created a new policy
Which tab do you select to enable the policy?
Ransomware - Answer Which security threat does Intercept X protect against?
Admin - Answer What is the minimum administrative role that will allow a user to create and edit policies
True - Answer When protecting a Mac client, you must know the password of the administrator
Check the system requirements - Answer What is the first step you must take when deploying virtual environments?
8190 - Answer Which TCP port is used to communicate policies to endpoints?
- / 2