Which statement describes an advantage of cloud-based detection?
A. Limited customization allows for faster detection.
B. Fewer resources are required on the endpoint.
C. Sandboxing reduces the overall management overhead of the system.
D. High-speed analytical engines on the endpoint limit the amount of work the cloud must perform.
Which option is a detection technology that is used by FireAMP?
A. fuzzy matching
B. Norton AntiVirus
C. network scans
D. Exterminator
If a file's SHA-256 hash is sent to the cloud, but the cloud has never seen the hash before, which disposition is returned?
A. Clean
B. Neutral
C. Malware
D. Unavailable
File information is sent to the Sourcefire Collective Security Intelligence Cloud using which format?
A. MD5
B. SHA-1
C. filenames
D. SHA-256
Advanced custom signatures are written using which type of syntax?
A. Snort signatures
B. Firewall signatures
C. ClamAV signatures
D. bash shell
What is the default clean disposition cache setting?
A. 3600
B. 604800
C. 10080
D. 1 hour
The Update Window allows you to perform which action?
A. identify which hosts need to be updated
B. email the user to download a new client
C. specify a timeframe when an upgrade can be started and stopped
D. update your cloud instance
Which hosts merit special consideration for crafting a policy?
A. end-user hosts
B. domain controllers
C. Linux servers
D. none, because all hosts should get equal consideration
Which statement represents a best practice for deploying on Windows servers?
A. You should treat Windows servers like any other host in the deployment.
B. You should obtain the Microsoft TechNet article that describes the proper exclusions for Windows servers.
C. You should never configure exclusions for Windows servers.
D. You should deploy FireAMP connectors only alongside existing antivirus software on Windows servers.
Which question should be in your predeployment checklist?
A. How often are backup jobs run?
B. Are any Linux servers being deployed?
C. Who are the users of the hosts on which you will deploy?
D. Which applications are installed on the hosts on which you will deploy?
Which action can you take from the Detections/Quarantine screen?
A. Create a policy.
B. Restore the detected file.
C. Run a report.
D. Change computer group membership.
In a FireAMP Private Cloud installation, deployed connectors communicate with which server?
A. opadmin.
B. console.
C. cloud.
D. aws.
For connector-to-FireAMP Private Cloud communication, which port number is used for lower- overhead communication?
A. 22
B. 80
C. 443
D. 32137
In a FireAMP Private Cloud installation, which server does an administrator use to manage connector policy and view events?
A. opadmin.
B. console.
C. cloud.
D. aws.
Which of these can you use for two-step authentication?
A. the Apple Authenticator app
B. the Google Authenticator app
C. a SecurID token
D. any RFC 1918 compatible application