What are two ways to prevent exploits? (Choose two.)
Answer : A, F
How does an administrator make a Tech Support File?
Answer : B
Which three file types will be uploaded automatically to WildFire for examination? (Choose three.)
Answer : A, E, F
Which two statements about targeted attacks are true? (Choose two.)
Answer : A, B
Which is the correct set of prerequisite software components for a production deployment of Endpoint Security Manager?
Answer : E
By default, where are log entries for the ESM Server and the ESM Console stored?
Answer : A
Which three statements about the trusted publisher mechanism are true? (Choose three.)
Answer : B, C, D