Which disposition can be returned in response to a malware cloud lookup?
A. Dirty
B. Virus
C. Malware
D. Infected
Which option is a detection technology that is used by FireAMP?
A. fuzzy matching
B. Norton AntiVirus
C. network scans
D. Exterminator
Incident responders use which policy mode for outbreak control?
A. Audit
B. Protect
C. Triage
D. Emergency
How many days' worth of data do the widgets on the dashboard page display?
A. the previous 5 days of data
B. the previous 6 days of data
C. the previous 7 days of data
D. the number of days you set in the dashboard configuration
Which type of activity is shown in the Device Trajectory page?
A. the IP addresses of hosts on which a file was seen
B. the activity of the FireAMP console users
C. the hosts that are in the same group as the selected host
D. file creation
Which statement is true about the Device Trajectory feature?
A. It shows where the endpoint devices have moved in your environment by displaying each IP address that a device has had over time.
B. A "plus" sign on the File Trajectory map indicates that you can execute the file inside FireAMP.
C. In the File Trajectory map, you can view the parent process for a file by selecting the infected system.
D. It shows hosts that display Indications of Compromise.
In a FireAMP Private Cloud installation, which server does an administrator use to manage connector policy and view events?
A. opadmin.
B. console.
C. cloud.
D. aws.
A default FireAMP Private Cloud installation can accommodate how many connectors over which period of time?
A. 100 connectors over a 15-day period
B. 1000 connectors over a 45-day period
C. 5000 connectors over a 10-day period
D. 500 connectors over a 30-day period
Where is the File Fetch context menu option available?
A. anywhere a filename or SHA-256 hash is displayed
B. only from the Filter Event View page
C. from the Audit Event page
D. from the configuration in the Business Defaults page
Which FireAMP capability can tell you how malware has spread in a network?
A. File Analysis
B. Threat Root Cause
C. File Trajectory
D. Heat Map