Which Endpoint > Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?
A. Discover Endpoints
B. Endpoint Enrollment
C. Discover and Deploy
D. Device Discovery
Which technique randomizes the e memory address map with Memory Exploit Mitigation?
A. SEHOP
B. ROPHEAP
C. ASLR
D. ForceDEP
Which device page should an administrator view to track the progress of an issued device command?
A. Command Status
B. Command History
C. Recent Activity
D. Activity Update
Which option should an administrator utilize to temporarily or permanently block a file?
A. Delete
B. Hide
C. Encrypt
D. Blacklist
Which policy should an administrator edit to utilize the Symantec LiveUpdate server for pre- release content?
A. The Firewall Policy
B. The System Schedule Policy
C. The System Policy
D. The LiveUpdate Policy
What does an end-user receive when an administrator utilizes the Invite User feature to distribute the SES client?
A. An email with a link to directly download the SES client
B. An email with a link to a KB article explaining how to install the SES Agent
C. An email with the SES_setup.zip file attached
D. An email with link to register on the ICDm user portal
Which security control is complementary to IPS, providing a second layer of protection against network attacks?
A. Host Integrity
B. Antimalware
C. Firewall
D. Network Protection
Which type of security threat is used by attackers to exploit vulnerable applications?
A. Lateral Movement
B. Privilege Escalation
C. Command and Control
D. Credential Access
Which two (2) scan range options are available to an administrator for locating unmanaged endpoints? (Select two)
A. IP range within network
B. IP range within subnet
C. Entire Network
D. Entire Subnet
E. Subnet Range
Which statement best describes Artificial Intelligence?
A. A program that automates tasks with a static set of instructions
B. A program that can predict when a task should be performed
C. A program that is autonomous and needs training to perform a task
D. A program that learns from experience and perform autonomous tasks