Solutions
That the cloned policy has been enforced Right Ans - You have cloned the
threat protection base policy, applied the policy to a group and saved it. When
checking the endpoint, the policy changes have not taken effect. What do you
check in the policy
8190 Right Ans - Which TCP port is used to communicate policies to
endpoint?
To download updates from Sophos Central and store them on a dedicated
server on your network Right Ans - What is the function of an update
cache?
Download and run the installer from Sophos Central Right Ans - Which of
the following is a method of deploying endpoint protection?
8191 Right Ans - Which TCP port is used to communicate Updates on
endpoint?
False Right Ans - A message relay can be configured on a Server without an
Update Cache.
True Right Ans - When protecting a MAC client, you must know the
password of the administrator.
Connects to a cloud server to check for the latest information about a file
Right Ans - What is the function of live protection?
To block specific applications from running on protected endpoints Right
Ans - Which is the function of Application control?
To connect Sophos security solutions in real time Right Ans - What is the
function of Sophos Synchronized Security?
, Control access to websites based on their category Right Ans - What is the
function of Web Control?
To detect and stop compromised vulnerable applications Right Ans - What
is the function of anti-exploit technology?
Exploit technique detection Right Ans - Which feature of intercept X is
designed to detect malware before it can execute?
Data loss prevention rule Right Ans - You want to change an action for
'confidential' content. Where in Sophos Central do you make this change
False Right Ans - Base policies can be disabled in Sophos Central.
Threat Protection Right Ans - You are detecting low-reputation files and
want to change the reputation level from recommended to strict. Which policy
do you edit to make this change?
Threat protection Right Ans - Which endpoint protection policy protects
users against malicious network traffic?
True Right Ans - TRUE or FALSE: Tamper protection must be disabled
before removing Endpoint protection.
Web Control Right Ans - Which endpoint protection policy do you edit to
block users from visiting a specific website category?
Threat Protection Right Ans - Which endpoint protection policy block
access to malicious websites?
False Right Ans - TRUE or FALSE: All Endpoints have the same endpoint
password.
Application Control Right Ans - Which feature allows you to restrict
application?
Check system requirement Right Ans - What is the first step you must take
when deploying virtual environments?