Question 81
SmartEvent uses it's event policy to identify events. How can this be customized?
Question 82
During inspection of your Threat Prevention logs you find four different computers having one event each with a Critical Severity. Which of those hosts should you try to remediate first?
Question 83
When Identity Awareness is enabled, which identity source(s) is(are) used for Application Control?
Question 84
The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?
Question 85
What is the purpose of extended master key extension/session hash?
