Sophos Endpoint Security and Control Test

A futuristic office environment with a computer screen displaying Sophos Endpoint Security interface, showcasing graphs, warning alerts, and a clean user-friendly design. The atmosphere should convey a sense of cyber security and protection against digital threats.

Sophos Endpoint Security Challenge

Test your knowledge on Sophos Endpoint Security and Control with our engaging quiz! This quiz is designed for IT professionals and enthusiasts looking to validate their expertise in endpoint protection and security practices.

  • 23 multiple choice questions
  • Covers key technologies and procedures
  • Ideal for certification prep
23 Questions6 MinutesCreated by GuardingData315
What information does the Sophos Endpoint Security HELP file provide?
Pc’s Software
Step by step detail examples
Control and explains procedures step by step.
All of the above.
Which product of Sophos Endpoint uses HIPS technology to protect Windows computers from unidentified or "zero-day" threats and suspicious behaviour?
Sophos Web Protection
Sophos Anti-Virus
Sophos Behaviour Monitoring
Sophos Live Protection
Which product of Sophos Endpoint improves detection of new malware without the risk of unwanted detections
Sophos Live Protection
Sophos Device Control
Sophos Data Control
Sophos Web Control
What does the home page enable you to do?
Change the content right-hand pane
Secure and change the controls
Override the controls and software
Configure and use the software
Sophos Endpoint Security and Control restricts access to
Certain parts of the software to members of certain Sophos groups
The user rights for Quarantine manager
Scan anything from a single file to your entire computer
Detect viruses if certain encryption software is installed
If tamper protection is enabled, a Sophos Administrator must know the tamper protection password to perform the following tasks:
Configure on-access scanning.
Configure suspicious behaviour detection.
Disable tamper protection.
All of the above
By default, Sophos Anti-Virus detects and cleans up the following threats during an on-access scan
Viruses
Trojans
Worms
All of the above
What are PUA’s?
Virus
Spyware
Application
Ransomware
Device control enables you to __________ the following types of device storage, network, short range, and media.
Block
Quarantine
Clean-up
Delete
If you are a member of the Sophos Administrator group and if tamper protection is enabled, you must know the tamper protection password to perform the following tasks:
Disable tamper protection
Re-configure on-access scanning or suspicious behaviour detection settings
Uninstall Sophos SafeGuard Disk Encryption using Control Panel
All of the above
None of the above
If Sophos Anti-Virus could not clean a threat ("Cleanup failed"), it may be that:
The user have insufficient access rights
The threat is hidden
Scan is in process
Sophos Anti-Virus could not active the threat
If your computer has become very slow, it may be that you have:
A PUA running on and monitoring your computer
Ransomware running on and monitoring your computer
A hacker spying through your camera
All the above
__________ is a rule that applies only to packets of data transferred over the network to or from a particular application
Content rule
Custom rule
Application rule
Self-Described rule
___________ is the overall term for pre-execution behaviour analysis and runtime behaviour analysis.
Host Intrusion Prevention System (HIPS)
Content Control List (CCL)
Virus identity file (IDE)
NetBIOS
To scans every part of every file is called:
Scheduled scan
Extensive scanning
Right-click scanning
On-demand scanning
A file that exhibits a combination of characteristics that are commonly, but not exclusively, found in viruses is called a _______________
True file type
Virus identity file
Suspicious file
Unknown file
An application that is allowed full and unconditional access to the network is known as a ____________
Trusted application
Managed application
Secured application
Secondary application
The settings that specify whether modified or hidden processes should be allowed network access are ________________.
Process settings
Configuration settings
User settings
Group settings
________________ is a feature that detects communications between compromised computers and attackers' command and control servers.
Compromised detection
Command control detection
Malicious Network Detection
Malicious Traffic Detection
______________ is the module that enables you to view and deal with items that have been quarantined.
Module network
Quarantine network
Quarantine manager
Module manager
Sophos Web Protection provides enhanced protection against web threats. It includes the following features except for:
Live URL יִltering
Scanning of downloaded content
Checking of the reputation of downloaded יִles
Web designing
Sophos protect against Zero Day Attacks
True
False
A Zero-day vulnerability is a computer-software vulnerability that is unknown to, or unaddressed by, those who should be interested in mitigating the vulnerability. Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network.
True
False
{"name":"Sophos Endpoint Security and Control Test", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on Sophos Endpoint Security and Control with our engaging quiz! This quiz is designed for IT professionals and enthusiasts looking to validate their expertise in endpoint protection and security practices. 23 multiple choice questions Covers key technologies and procedures Ideal for certification prep","img":"https:/images/course7.png"}
Powered by: Quiz Maker