Which statement describes an advantage of cloud-based detection?
A. Limited customization allows for faster detection.
B. Fewer resources are required on the endpoint.
C. Sandboxing reduces the overall management overhead of the system.
D. High-speed analytical engines on the endpoint limit the amount of work the cloud must perform.
Which disposition can be returned in response to a malware cloud lookup?
A. Dirty
B. Virus
C. Malware
D. Infected
Which option is a detection technology that is used by FireAMP?
A. fuzzy matching
B. Norton AntiVirus
C. network scans
D. Exterminator
Which hosts merit special consideration for crafting a policy?
A. end-user hosts
B. domain controllers
C. Linux servers
D. none, because all hosts should get equal consideration
Incident responders use which policy mode for outbreak control?
A. Audit
B. Protect
C. Triage
D. Emergency
When you are viewing information about a computer, what is displayed?
A. the type of antivirus software that is installed
B. the internal IP address
C. when the operating system was installed
D. the console settings
For connector-to-FireAMP Private Cloud communication, which port number is used for lower- overhead communication?
A. 22
B. 80
C. 443
D. 32137
In a FireAMP Private Cloud installation, an administrator uses which server to configure the FireAMP Private Cloud properties?
A. opadmin.
B. console.
C. cloud.
D. aws.
Which option represents a configuration step on first use?
A. Verify, Contain, and Protect
B. User Account Setup
C. System Defaults Configuration
D. Event Filtering
Where is the File Fetch context menu option available?
A. anywhere a filename or SHA-256 hash is displayed
B. only from the Filter Event View page
C. from the Audit Event page
D. from the configuration in the Business Defaults page