Exam Kaspersky

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

1. Which plug-in is required for configuring the EDR Optimum functionality?

Kaspersky Endpoint Security for Windows plug-in


Kaspersky Endpoint Agent plug-in√
Kaspersky EDR Optimum plug-in
The EDR Optimum functionality setup does not require a plug-in
2. Which of the following applications must a customer activate with an EDR Optimum
license key (or code) to be able to use the EDR Optimum functionality?
KSC Administration Server
KSC Network Agent√
Kaspersky Endpoint Agent
Kaspersky Endpoint Security for Windows
3. Which version of Kaspersky Endpoint Security is required for using the EDR Optimum
functionality?
11.4 or later√
11.3 or later
11.2 or later
11.0 or later
4. How is EDR Optimum licensed?
Per user
Per device
Per protection server√
Per incident that a security officer can process over 24 hours
5. What additional data about dangerous files does EDR Optimum provide compared to
ordinary detection events?
Process memory dump for analysis√
Network connections that the dangerous file established√
Registry keys accessed by the dangerous file
Privileges with which the dangerous file was run
Checksum of the dangerous file√
6. ABC Inc. has a distributed KSC installation. Computers of a remote office communicate
with the KSC via a connection gateway. Only the connection gateway can access the KSC.
Which specifics does EDR Optimum deployment have on such a network?
To ensure that KSC receives telemetry, EDR Optimum must have direct access to the
KSC through port 13291√
In the connection gateway properties, you must select to transfer EDR Optimum telemetry
You must make the connection gateway a KSN Proxy
There are no specifics, EDR Optimum telemetry is transferred by the Network Agent
transport
7. Which of the following products can Kaspersky EDR Optimum Add-on be used with?
KES Cloud
KESB Select
KESB Advanced
Kaspersky Total Security
8. Which AUTOMATED response tools are available in EDR Optimum?
Isolate the endpoint if KES detects a threat
Isolate the endpoint if an IOC scan task detects an object
Run a critical area scan task if an IOC scan task detects an object
Quarantine a file if an IOC scan task detects an object
If an IOC scan task detects a threat, prevent its execution on the network hosts
9. Which applications must be installed on the endpoints to ensure that EDR Optimum
operates properly?
Kaspersky Endpoint Agent
KSC Network Agent and Kaspersky Endpoint Agent
KSC Network Agent and Kaspersky Endpoint Security for Windows
KSC Network Agent, Kaspersky Endpoint Security for Windows and Kaspersky Endpoint
Agent
10. What is the minimum number of endpoints for which a customer can purchase EDR
Optimum + Kaspersky Sandbox?
10
50
100
250
1. Which plug-in is required for configuring the EDR Optimum functionality?
Kaspersky Endpoint Security for Windows plug-in
Kaspersky Endpoint Agent plug-in
Kaspersky EDR Optimum plug-in
The EDR Optimum functionality setup does not require a plug-in
2. Which of the following applications must a customer activate with an EDR Optimum
license key (or code) to be able to use the EDR Optimum functionality?
KSC Administration Server
KSC Network Agent
Kaspersky Endpoint Agent
Kaspersky Endpoint Security for Windows
3. Which version of Kaspersky Endpoint Security is required for using the EDR Optimum
functionality?
11.4 or later
11.3 or later
11.2 or later
11.0 or later
4. How is EDR Optimum licensed?
Per user
Per device
Per protection server
Per incident that a security officer can process over 24 hours
5. What additional data about dangerous files does EDR Optimum provide compared to
ordinary detection events?You have reached the max number of allowed answers
Process memory dump for analysis
Network connections that the dangerous file established
Registry keys accessed by the dangerous file
Privileges with which the dangerous file was run
Checksum of the dangerous file
6. ABC Inc. has a distributed KSC installation. Computers of a remote office communicate
with the KSC via a connection gateway. Only the connection gateway can access the KSC.
Which specifics does EDR Optimum deployment have on such a network?
To ensure that KSC receives telemetry, EDR Optimum must have direct access to the
KSC through port 13291
In the connection gateway properties, you must select to transfer EDR Optimum telemetry
You must make the connection gateway a KSN Proxy
There are no specifics, EDR Optimum telemetry is transferred by the Network Agent
transport
7. Which of the following products can Kaspersky EDR Optimum Add-on be used with?You
have reached the max number of allowed answers
KES Cloud
KESB Select
KESB Advanced
Kaspersky Total Security
8. Which AUTOMATED response tools are available in EDR Optimum?You have reached
the max number of allowed answers
Isolate the endpoint if KES detects a threat
Isolate the endpoint if an IOC scan task detects an object
Run a critical area scan task if an IOC scan task detects an object
Quarantine a file if an IOC scan task detects an object
If an IOC scan task detects a threat, prevent its execution on the network hosts
9. Which applications must be installed on the endpoints to ensure that EDR Optimum
operates properly?
Kaspersky Endpoint Agent
KSC Network Agent and Kaspersky Endpoint Agent
KSC Network Agent and Kaspersky Endpoint Security for Windows
KSC Network Agent, Kaspersky Endpoint Security for Windows and Kaspersky Endpoint
Agent
10. What is the minimum number of endpoints for which a customer can purchase EDR
Optimum + Kaspersky Sandbox?
10
50
100
250

You might also like