Custom whitelists are used for which purpose?
A. to specify which files to alert on
B. to specify which files to delete
C. to specify which files to ignore
D. to specify which files to sandbox
From the Deployment screen, you can deploy agents via which mechanism?
A. push to client
B. .zip install file
C. user download from Sourcefire website or email
D. precompiled RPM package
When you are viewing information about a computer, what is displayed?
A. the type of antivirus software that is installed
B. the internal IP address
C. when the operating system was installed
D. the console settings
How many days' worth of data do the widgets on the dashboard page display?
A. the previous 5 days of data
B. the previous 6 days of data
C. the previous 7 days of data
D. the number of days you set in the dashboard configuration
Which type of activity is shown in the Device Trajectory page?
A. the IP addresses of hosts on which a file was seen
B. the activity of the FireAMP console users
C. the hosts that are in the same group as the selected host
D. file creation
Which statement is true about the Device Trajectory feature?
A. It shows where the endpoint devices have moved in your environment by displaying each IP address that a device has had over time.
B. A "plus" sign on the File Trajectory map indicates that you can execute the file inside FireAMP.
C. In the File Trajectory map, you can view the parent process for a file by selecting the infected system.
D. It shows hosts that display Indications of Compromise.
FireAMP reports can be distributed by which mechanism?
A. email
B. cloud sync
C. Windows file share
D. a Crystal Reports subscription
In a FireAMP Private Cloud installation, which server does an administrator use to manage connector policy and view events?
A. opadmin.
B. console.
C. cloud.
D. aws.
A default FireAMP Private Cloud installation can accommodate how many connectors over which period of time?
A. 100 connectors over a 15-day period
B. 1000 connectors over a 45-day period
C. 5000 connectors over a 10-day period
D. 500 connectors over a 30-day period
When a user initiates a scan, which types of scan are available as options?
A. scheduled scan, thorough scan, quick scan, network scan
B. jiffy scan, overnight scan, scan when available, vulnerability scan
C. flash scan, custom scan, full scan
D. none, because user-initiated scans are not allowed