You are on page 1of 3

1.

 Introduction to Enduser Protection v5.3.5


 1. Which type of threat data is used to monitor all system processes for signs of active malware
actions?

 2. Which of the following platforms support anti-virus policies managed by Sophos Enterprise
Console? (select all that apply)

2. Introduction to Enduser Protection Scenarios v5.3.5


 1. A customer is worried about bandwidth availability at one of their branch offices. What options
would you recommend to help them manage the bandwidth used by updating, without compromising
security? (select all that apply)

 2. A customer asks what protection is provided against new variants of malware that have not yet
been included in the Sophos virus data files. Which of the following answers are correct? (select all that
apply)

3. Solution Architecture v5.3.5


 1. A customer is worried about bandwidth availability at one of their branch offices. What options
would you recommend to help them manage the bandwidth used by updating, without compromising
security? (select all that apply)

 2. Which port numbers are required for communication by RMS Message Routers? (select all that
apply)

4. System Requirements and Deployment v5.3.5


 1. How would you convert a trial into a full product?

 2. Which of the following platforms are supported by the Sophos Client Firewall? (select all that
apply)

 3. Sophos Enterprise Console requires entry of usernames and passwords when configuring which
of the following ? (select all that apply)

5. System Requirements and Deployment Scenarios v5.3.5


 1. A new customer has asked if it is possible to keep their existing anti-virus software running
alongside Sophos Endpoint Protection. What recommendation would you give to your customer so they
follow best practice and minimize effort? (select all that apply)

 2. A customer uses Microsoft Active Directory on their network and would like their
deployment of Sophos Endpoint Protection to follow a structure that is similar to that defined
for their Organizational Units (OU). They also expect a significant number of new computers to
be added to Active Directory and those they are replacing will be removed.

What would you recommend they do to achieve this with the minimum effort? (select all that apply)

6. Managing Updating and Anti-virus v5.3.5


 1. If the default settings are used which of the following file types will be included in on-access
scanning? (select all that apply)

 2. Which of the following are benefits of deploying a Web CID? (select all that apply)

 3. When should a subscription version other than Recommended be used? (select all that apply) 

 4. Which of the following statements about Sophos Tamper Protection are true? (select all that
apply)
7. Managing Updating and Anti-virus Scenarios v5.3.5
 1. A customer has an application that they use for remote management and troubleshooting. This is
detected as suspicious by Sophos Anti-virus. How can the customer ensure that use of the application
is allowed and does not generate alerts, without compromising security?

 2. A customer has learned of some new features that will be included a planned release of Endpoint
Security and Control. They are keen to deploy the new version to a test group, as soon as it is fully
tested. What should you tell them?

 3. A customer has a large number of Mac OS X computers and wants to know how easy it will be to
manage them using Sophos Endpoint Protection. Which of the following answers are correct? (select all
that apply)

8. Managing Application, Data and Device Control v5.3.5


 1. Which of the following policies can be configured with Application Control? (select all that apply)

 2. Data Control will scan files in which of the following scenarios? (select all that apply)

9. Managing Application, Data and Device Control Scenarios v5.3.5


 1. A customer is concerned that users are not treating confidential documents with sufficient care.
They would like to monitor any information that is sent by email without imposing any restrictions at this
stage. Which of the following actions would you recommend? (select all that apply)

 2. A customer wants to restrict the use of USB disks to only those which support hardware
encryption. How would you advise them to achieve this? (select all that apply)

10. Managing Web Control, Patch and Firewall v5.3.5


 1. Which of the following are features of web protection? (select all that apply)

 2. Web Control has been configured to block access to a category but this is preventing access to a
desired location. What method(s) can be used to allow access just to this site? (select all that apply)

 3. Which of the following actions are performed by Patch Assessment? (select all that apply)

 4. Which protocol is used by the Patch Agent to communicate with the Patch Server?

11. Managing Web Control, Patch and Firewall Scenarios v5.3.5


 1. A customer wants to understand the role of Web Control versus Web Protection. Which of the
following statements would you use to assist them? (select all that apply)

 2. A customer has implemented Patch Assessment but wants to better understand the reason for
the recommended patches and the implications if they are not installed. Which of the following provides
the easiest way for them to obtain this information? (select all that apply)

12. Management at the Endpoint v5.3.5


 1. Which Windows group's members are allowed to change the endpoint client software
configuration via the graphical user interface (GUI)?

 2. A customer wants to allow their users to run a scan and perform cleanup. Which group should
they be added to in order to perform these tasks but not receive any additional privileges?

13. Role-based Administration and Reporting v5.3.5


 1. A user that has the HelpDesk role also needs to be able to configure reports. Which of the
following solutions is the best to enable them to do this?
14. Role-based Administration and Reporting (Scenarios) v5.3.5
 1. A customer has viewed the standard reports in Enterprise Console. The information provided is
close to what they require but they would like to modify settings such as the filters applied. Which action
should they take?

15. Labs v5.3.5
 1. Which folder path is used by the default SophosUpdate share? (Lab 2, Task 2)

 2. What is the file type logged in the Data Control - Event Viewer for the text file with over 10 email
addresses? (Lab 5, Task 2)

 3. Which Sophos Knowledge Base article lists the Secure Removable Devices that are supported?
(Lab 5, Task 3)

 4. Which folder path is used by the default SUMInstallSet share? (Lab 2, Task 2)

 5. What are the default assigned rights for the Helpdesk role? (select all that apply) (Lab 7, Task 2)

 6. Which of the following vendors have patch definitions for Sophos Patch Assessment? (select all
that apply) (Lab 6, Task 4)

 7. Which of the following are settings applied to the user that is automatcally created on
WORKSTATION? (select all that apply) (Lab 3, Task 7)

 8. What are the default Live Protection settings for Enable Live Protection and Automatically send
sample files to Sophos? (Lab 4, Task 2)

You might also like