An administrator suspects that several computers have become part of a botnet. What should the administrator do to detect botnet activity on the network?
Answer : A
Which term or expression is utilized when adversaries leverage existing tools in the environment?
Answer : B
Which report template includes a summary of risk distribution by devices, users, and groups?
Answer : B
Which device page should an administrator view to track the progress of an issued device command?
Answer : C
Which security threat uses malicious code to destroy evidence, break systems, or encrypt data?
Answer : A
An administrator learns of a potentially malicious file and wants to proactively prevent the file from ever being executed.
What should the administrator do?
Answer : D
What does SES's advanced search feature provide when an administrator searches for a specific term?
Answer : A