Question 81

SmartEvent uses it's event policy to identify events. How can this be customized?
  • Question 82

    During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?
  • Question 83

    When Identity Awareness is enabled, which identity source(s) is(are) used for Application Control?
  • Question 84

    The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?
  • Question 85

    What is the purpose of extended master key extension/session hash?