MultipleChoice
A customer has an environment with the following:
• 1,000 agents communicating over SSL with two servers - one containing the ESM Server and another one where the ESM Console is installed
• BitsUploads resides on the ESM Console server
• ESM Server and Console are using the default pods tor communication
In a scenario where a file is failing to be uploaded from macOS, which three reasons could be directly related to the failure? (Choose three.)
OptionsMultipleChoice
The administrator has added the following whitelist to the WildFire Executable Files policy.
*mysoftware.exe
What will be the result of this whitelist?
OptionsMultipleChoice
An administrator would like to add Google Chrome and Google Chrome Helper to the exploit prevention policy for macOS. In order to achieve this task, which option should be added to the macOS protected processes list?
OptionsMultipleChoice
Files are not getting a WildFire verdict.
What is one way to determine whether there is a BITS issue?
OptionsMultipleChoice
A deployment contains some machines that are not part of the domain. The Accounting and Sales departments are two of these.
How can a policy of WildFire notification be applied to Accounting, and a policy of WildFire prevention be applied to Sales, while not affecting any other WildFire policies?
OptionsMultipleChoice
A company is using a Web Gateway/Proxy for all outbound connections. The company has deployed Traps within the domain and in testing, discovered that the ESM Servers are unable to communicate with WildFire. All other Traps features are working. What is the most likely cause of the issue?
OptionsMultipleChoice
Which software category is most likely to cause a conflict with the Traps agent?
OptionsMultipleChoice
What is the default interval for Traps agents to communicate via heartbeat to the ESM?
OptionsMultipleChoice
In a scenario that macOS Traps logs failed to be uploaded to the forensic folder, where will the user on the macOS host be able to find to collected logs?
OptionsMultipleChoice
An Administrator has identified an EPM-triggered false positive and has used the Create Rule button from within the relevant entry in the Security Events > Preventions > Exploits tab. What is the result of the created rule?
Options