Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free 500-651 Questions Attempt

Page: 2 / 3
Total 90 questions

Security Architecture for Systems Engineer (SASE) Questions and Answers

Question 5

Which of AMP’s File capabilities deals with the problem of files passing through perimeter defenses that are later discovered to be a threat?

Options:

A.

Dynamic Analytics

B.

Malware Security

C.

File Retrospection

D.

Trajectory

Question 6

How does AMP’s device trajectory capabilities help address customer ’s issues?

Options:

A.

It determines the scope and cause of an outbreak and tracks suspicious files

B.

It searches for potential threats based on identified activities and behaviors

C.

It isolates suspicious files and runs them in a sa ndbox environment to determine their authenticity

D.

It analyses the data from suspicious files to provide a new level of threat intelligence

Question 7

Which AMP feature is provided by fuzzy fingerprinting?

Options:

A.

Identifies specific instances of malware with a signature-based approach

B.

Automatically detects polymorphic variants of known malware

C.

Provides recursive DNS lookup services

D.

Identifies new malware using statistical modeling and analytics engines

Question 8

Which are two main features of Intrusion Prevention? (Choose two.)

Options:

A.

Threat analysis through network behavior analysis

B.

Protecting against Zero-Day attacks

C.

Layer-4 traffic monitoring across platforms

D.

Vulnerability-ba sed threat management

Page: 2 / 3
Total 90 questions