Sophos engineer exam | 101 Actual Questions and Answers | Updated
That the cloned policy has been enforced - Answer You have cloned the threat protection base policy, applied the policy to a group and saved it. When checking the endpoint, the policy changes have not taken effect. What do you check in the policy
8190 - Answer Which TCP port is used to communicate policies to endpoint?
To download updates from Sophos Central and store them on a dedicated server on your network - Answer What is the function of an update cache?
Download and run the installer from Sophos Central - Answer Which of the following is a method of deploying endpoint protection?
8191 - Answer Which TCP port is used to communicate Updates on endpoint?
False - Answer A message relay can be configured on a Server without an Update Cache.
True - Answer When protecting a MAC client, you must know the password of the administrator.
Connects to a cloud server to check for the latest information about a file - Answer What is the function of live protection?
To block specific applications from running on protected endpoints - Answer Which is the function of Application control?
To connect Sophos security solutions in real time - Answer What is the function of Sophos Synchronized Security?
Control access to websites based on their category - Answer What is the function of Web Control? 1 / 2
To detect and stop compromised vulnerable applications - Answer What is the function of anti-exploit technology?
Exploit technique detection - Answer Which feature of intercept X is designed to detect malware before it can execute?
Data loss prevention rule - Answer You want to change an action for 'confidential' content. Where in Sophos Central do you make this change
False - Answer Base policies can be disabled in Sophos Central.
Threat Protection - Answer You are detecting low-reputation files and want to change the reputation level from recommended to strict. Which policy do you edit to make this change?
Threat protection - Answer Which endpoint protection policy protects users against malicious network traffic?
True - Answer TRUE or FALSE: Tamper protection must be disabled before
removing Endpoint protection.
Web Control - Answer Which endpoint protection policy do you edit to block users from visiting a specific website category?
Threat Protection - Answer Which endpoint protection policy block access to malicious websites?
False - Answer TRUE or FALSE: All Endpoints have the same endpoint
password.
Application Control - Answer Which feature allows you to restrict application?
Check system requirement - Answer What is the first step you must take when deploying virtual environments?
- / 2