ET15 Sophos Central Enpoint and Server Engineer v2
ET15 Sophos Central Enpoint and Server Engineer v2
ET15 Sophos Central Enpoint and Server Engineer v2
When checking the endpoint, the policy changes have not taken effect. What do you
check in the policy?
Registry keys
Endpoints
Folders
Network
Files
Question 7
What is the function of a Message Relay?
Question 8
Complete the sentence
Threat Protection
Web Control
Application Control
Peripheral Control
Question 10
What is the minimum administrative role that will allow a user to manage user roles
and role assignments?
Help Desk
Read Only
Admin
Super Admin
Question 11
In which policy do you enable device isolation?
Threat Protection
Data Loss Prevention
Application Control
Update Management
Question 12
TRUE or FALSE
You can search for a malicious item across your network using EDR
TRUE
FALSE
Question 13
An endpoint is reporting that Sophos AutoUpdate is not installed.
In the Self-Help Tool which tab do you check to view whether AutoUpdate is listed as
installed?
Installed components
Management Communication
Update
System
Question 14
What is the FIRST step you must take when deploying virtual environments?
Question 15
What is the minimum administrative role that will allow a user to scan endpoints?
Super Admin
Admin
Read Only
Help Desk
Question 16
What is the function of Live Protection?
Lists all the official email servers that may send email for your domain
Blocks Denial of Server (DDoS) attacks
Connects to a cloud server to check for the latest information about a
file
Monitors running processes' behaviour
Question 17
What is the function of Peripheral Control?
Question 18
TRUE or FALSE
FALSE
TRUE
Question 19
Which detection feature can prevent attacks on the master boot record?
CryptoGuard
WipeGuard
Malicious Traffic Detection
Anti-exploit
Question 20
For most detections, which clean up process is used to clean up the detection?
Automatic Clean Up
Bootable AV
Source of Infection Tool
Virus Removal Tool
Question 21
Which Sophos support tool do you use to find out the latest information about
security threats?
Sophos Support
SophosLabs
Sophos Community
Question 22
You want to prevent users from copying database files to USB drives without
blocking the use of all USB devices.
Application Control
Data Loss Prevention
Threat Protection
Peripheral Control
Question 23
Which TCP port is used to communicate Updates on endpoints?
8191
8190
8080
8290
Question 24
A malicious file has been detected on an endpoint and you want to prevent lateral
movement through your network.
Question 25
TRUE or FALSE
FALSE
TRUE
Question 26
Complete the sentence.
Question 27
What is the function of anti-exploit
technology?
Question 28
TRUE or FALSE
When protecting a Mac client, you must know the password of the administrator.
TRUE
FALSE
Question 29
You have a suspicious file on your endpoint.
Question 30
What is the first step you must take when removing Sophos Endpoint Protection
from a Windows endpoint?
Question 31
TRUE or FALSE
FALSE
TRUE
Question 32
Which TCP port is used to communicate policies to endpoints?
8080
8191
8290
8190
Question 33
What is the recommended way to allow a new application to a locked down server?
GROUPS
POLICY ENFORCED
USERS
SETTINGS
POLICY BYPASSED
Question 35
Which feature allows you to restrict applications on a server?
Server protection
Tamper protection
Endpoint protection
Server lockdown
Question 36
Which 2 of the following does tamper protection prevent users from doing?
Question 37
In which policy do you enable deep learning?
Web Control
Data Loss Prevention
Threat Protection
Application Control
Question 38
You are detecting low-reputation files and want to change the reputation level from
recommended to strict.
br>Which policy do you edit to make this change?
Web Control
Application Control
Data Loss Prevention
Threat Protection
Question 39
TRUE or FALSE
Deleting an endpoint in Sophos Central will remove the Endpoint agent from the
endpoint.
FALSE
TRUE
Question 40
Which 2 places in Sophos Central do you add exclusions for servers?
Global Settings
Exclusions tab
Exclusions import
Server Policy
Question 4
You want to mitigate exploits in vulnerable applications.
Question 6
Which is the function of Application Control?
Question 7
What is the function of an Update
Cache?
Question 8
A Windows endpoint installation is failing. It is detecting competitor software.
avremove.log
Sophos standalone installer.txt
Sophos extract log.txt
Sophos MCS install log.txt
Question 10
TRUE or FALSE
Question 11
Complete the sentence
Which 2 of the following are monitored when File Integrity Monitoring is enabled?
Registry Entries
Files
Processes
Applications
Question 15
You are unable to edit policies in Sophos Central.
Question 16
Which 2 components are required for protecting virtual environments?
Question 17
Which security threat does Intercept X protect against?
Signature-based scanning
Live Lookups
HIPS
Machine learning
Question 20
You need to give a user access to change their protection settings in an emergency.
Question 23
What is the function of Data Loss Prevention?
Question 24
>b>What is the minimum administrative role that will allow a user to create and edit
policies?
Read Only
Admin
Super Admin
Help Desk
Question 26
Complete the sentence
Question 28
Which section in the Self-Help tool should be checked to starting investigating an
updating issue on an endpoint?
System
Services
Policy
Update
Question 29
Which endpoint protection policy do you edit to block users from visiting a specific
website category?
Threat Protection
Peripheral Control
Web Control
Application Control
Question 30
What is the function of on-access scanning
Lists all the official email servers that may send email for your domain
Connects to a cloud server to check for the latest information about a
file
Monitors running processes' behaviour
Blocks Denial of Server (DDoS) attacks
Question 31
TRUE or FALSE
TRUE
FALSE
Question 32
Which endpoint protection policy protects users against malicious network traffic?
Threat Protection
Peripheral Control
Web Control
Application Control
Question 33
Which log provides a record of all activities?
Event log
Audit log
Data Loss Prevention
Message history
Question 34
Which of the following is a method of deploying endpoint protection?
uestion 35
TRUE or FALSE
Question 36
Which feature of Intercept X is designed to detect malware before it can execute?
Security Heartbeat
Malicious traffic detection
CyrptoGuard ransomware detection
Exploit technique detection
Question 37
TRUE or FALSE
TRUE
FALSE
Question 38
You want to check an endpoint has received the latest policy updates from Sophos
Central.
Which tab do you select in the Endpoint Self-Help tool to view the last communication
date and time?
System
Management Communication
Update
Installed components
Question 39
Which report will give you information across all protected endpoints?
Endpoint report
Server report
Events report
Users report
Question 40
What does HIPS do on a protected endpoint?