Free PSE-Endpoint-Associate PSE Endpoint Associate Accreditation Exam (Traps 4.0) PSE-Endpoint-Associate Exam Practice Test

UNLOCK FULL
PSE-Endpoint-Associate Exam Features
In Just $59 You can Access
  • All Official Question Types
  • Interactive Web-Based Practice Test Software
  • No Installation or 3rd Party Software Required
  • Customize your practice sessions (Free Demo)
  • 24/7 Customer Support
Page: 1 / 5
Total Questions: 24
  • A user receives an email with an attached data file containing an exploit. What is it's likely effect? (Choose two.)A . The exploit can work only if a corresponding application is installed on the user's system.B . The exploit can do damage only if it downloads a piece of malware.C . The exploit can work only if it begins with a buffer overflow.D . The exploit might be launched merely by previewing the attachment.

    Answer: A, ,B Next Question
  • What can be used to change the uninstall passwords of agents after the initial installation of the ESM Server and the endpoint agent software?A . Using the Advanced tab of the Traps endpoint agent consoleB . Using an agent action in ESM ConsoleC . Using an ESM Server setting in ESM ConsoleD . Using the command 'dbconfig server uninstallpassword' on ESM Server

    Answer: C Next Question
  • Which two of the following TLS/SSL configurations are valid in a Traps 3.4 deployment? Choose two correct answers.A . ESM Server configured for TLS/SSL; endpoint configured for TLS/SSLB . ESM Server NOT configured for TLS/SSL; endpoint configured for TLS/SSLC . ESM Server configured for TLS/SSL; endpoint NOT configured for TLS/SSLD . ESM Server NOT configured for TLS/SSL; endpoint NOT configured for TLS/SSL

    Answer: A, ,B Next Question
  • The Traps product and documentation use the terms 'malware' and 'exploit' in a very specific way. Which two statements are true? (Choose two.)A . Exploits attempt to take advantage of a vulnerability in code.B . The primary vector for exploits is .exe files.C . Malware consists of application data files containing malicious code.D . Malware consists of malicious executable files that do not rely on exploit techniques.

    Answer: A, ,C Next Question
  • What are two ways to prevent exploits? (Choose two.)A . Return-Oriented ProgrammingB . Address Space Layout RandomizationC . Heap SprayD . Anti-Spyware Location and RemovalE . Retained Original ProcessF . Buffer OverflowData Execution Prevention

    Answer: A, ,F Next Question
  • Traps endpoints send which three items directly to the ESM Server over port 2125 by default? (Choose three.)A . Requests for software update packagesB . Verdict requestsC . WildFire malware reportsD . Exploit prevention dumpsE . Prevention eventsF . Heartbeats

    Answer: A, ,C, ,E Next Question
  • A user receives an email that has piece of malware as an attachment. Choose the true statement.A . The piece of malware can work only if a corresponding application is on the user's system.B . The piece of malware can do damage only if it makes a connection to a command-and-control server.C . The piece of malware can work only if it begins with a buffer overflow.D . The piece of malware can work only if the user opens the attachment.

    Answer: C Next Question
  • Which two statements about Local Analysis are true? (Choose two.)A . Traps endpoint agents build a local analysis model based on the executables they detect.B . Local analysis is called to validate all verdicts on executable files before the files are allowed to run.C . Palo Alto Networks uses machine-learning techniques in its labs to build the local analysis model.D . Local analysis is called whenever an executable file would otherwise get an Unknown or No Connection verdict.

    Answer: C, ,D Next Question
  • Which is the correct set of prerequisite software components for a production deployment of Endpoint Security Manager?A . IIS, .NET, Microsoft SQL Server or SQLite, and an active WildFire subscriptionB . IIS, .NET, and Microsoft SQLiteC . IIS, .NET, and any relational databaseD . IIS, .NET, Microsoft SQL Server, and an SMTP email serverE . IIS, .NET, and Microsoft SQL Server

    Answer: E Next Question
  • What can a Traps content update include? (Choose three.)A . New EPMsB . Updates to the local-analysis modelC . New trusted root certificatesD . New default policy rulesE . New trusted publishersF . New Traps endpoint drivers

    Answer: B, ,C, ,D Next Question
Page: 1 / 5
Total Questions: 24