Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 3

1. Central Dashboard v3.

0
1. Which URL address do you use to login to the Sophos Central Admin Console?

2. TRUE or FALSE:A user with the Help-Desk role can change MFA settings for all
administrators.

3. A colleague is unable to edit policies in Sophos Central.

What do you check in Sophos Central?


This answer can be found in Module 1: Central Dashboard.

2. User Management v3.0


1. What is the minimum administrative role that will allow a user to view logs and
reports?
This answer can be found in Module 1: Central Dashboard.

2. What is the minimum adminstrative role that will allow a user to scan
endpoints?

3. Threat Protection v3.0


1. Web Control has been configured to block access to a website category. This is
preventing access to a desired website.

Which of the following methods can be used to allow access to the site without
allowing access to other websites in the same category?

2. Which feature protects an endpoint from having it's master boot record
encrypted?

3. Complete the sentence:

Malicious Traffic Detection monitors ____________ .


The answer can be found in Module 2: Threat Protection

4. Protection Features v3.0


1. Which of the following best describes the function of Data Loss Prevention?

2. Which of the following best describes the function of Application Control?

3. Which of the following best descirbes the function of Web Control?

4. Which of the following best describes the function of Peripheral Control?

5. Server Protection v3.0


1. Which TCP port does the endpoint use to get updates?

2. TRUE or FALSE:The security VM installer is linked to your Sophos Central


account.
The answer can be found in Module 3: Server Protection and Management

3. Which 2 components are used for the protection of virtual environments (SVE)?

4. Which of the following best descirbes the function of an Update Cache?


6. Server Features v3.0
1. TRUE or FALSE:All server protection features are enabled by default.

2. Which 2 places in Sophos Central do you add exclusions for servers?


The answer can be found in Module 4: Server Protection Features and Policies

7. Endpoint Protection v3.0


1. What is the first step you must take when removing Sophos Endpoint Protection
from a Windows endpoint?

2. TRUE or FALSE: When protecting a MacOS endpoint, you must know the
administrator password for that endpoint.

3. TRUE or FALSE:Computers can only be a member of ONE computer group.

4. TRUE or FALSE:All endpoints have the same tamper protection password.

5. Which 2 of the following does tamper protection prevent users from doing?

6. Where can you download and run the endpoint protection installer from?

8. Endpoint Policies v3.0


1. Complete the sentence:

A content rule used in a Content Control List __________ .

2. Which endpoint protection policy protects users against malicious network


traffic?

3. You are detecting low-reputation files and want to change the reputation level
from recommended to strict.

Which policy do you edit to make this change?

4. Complete the following sentence:

The default protection base policy is configured with ________ .

5. You have created a threat protection policy, applied the policy to a group and
saved it.

When checking the endpoint, the policy changes have not taken effect. What do you
check in the policy?
The answer can be found in Module 6: Threat Protection Policies

9. Public Cloud v3.0


1. In which security layer would you deploy Sophos protection to public cloud
servers?
The answer can be found in Module 7: Public Cloud

10. Logs and Reports v3.0


1. TRUE or FALSE:Any report schedule will automatically stop after 6 months.
2. To perform a malware health check which two items should be selected in the
events report?

3. Which log or report can you view malware detections that have not been cleaned
up?

11. Health Status v3.0


1. Which of the following would cause a device to report a green health status in
Sophos Central?

12. Managing Detections v3.0


1. You suspect a file may be malicious on an endpoint.

Which tool can be used locally to scan the file?

2. What functionality does Live Discover provide?


The answer can be found in Module 9: Managing Detections

3. Complete the sentence.

Marking an alert as resolved _________ .

4. Which of the following features must be enabled in Global Settings before it


can be used?

5. A malicious file has been detected on an endpoint and you want to prevent
lateral movement through your network.

From the threat case, which action do you take?

13. Troubleshooting and Support v3.0


1. An endpoint is reporting that Sophos AutoUpdate is not installed.

In the Endpoint Self Help tool which tab do you use to check if the AutoUpdate is
installed?

You might also like