An administrator is testing an exploit that is expected to be blocked by the JIT Mitigation EPM protecting the viewer application in use. No prevention occurs, and the attack is successful.
In which two ways can the administrator determine the reason for the missed prevention? (Choose two.)
Answer : A, C
Which set of modules must be loaded and configured when using Metasploit?
Answer : C
An administrator has decided to test Traps functionality using malware samples in an isolated non-production environment. In order to effectively test Traps, what three types of samples should the administrator avoid? (Choose three.)
Answer : A, B, E
A deployment contains some machines that are not part of the domain. The Accounting and Sales departments are two of these.
How can a policy of WildFire notification be applied to Accounting, and a policy of WildFire prevention be applied to Sales, while not affecting any other WildFire policies?
Answer : C
A company discovers through the agent health display in ESM Console that a certain Traps agent is not communicating with ESM Server. Administrators suspect that the problem relates to TLS/SSL.
Which troubleshooting step determines if this is an SSL issue?
Answer : D
Assume a Child Process Protection rule exists for powershell.exe in Traps v 4.0. Among the items on the blacklist is ipconfig.exe. How can an administrator permit powershell.exe to execute ipconfig.exe without altering the rest of the blacklist?
Answer : A
Which version of .NET Framework is required as a prerequisite when installing Traps agent on Windows 7?
Answer : B