Question No : 1
Which statement about Malware verdicts is true?
A. If WildFire is not available when the active ESM server tries to reach it for a verdict on a file, the endpoint will get a verdict from local analysis.
B. If the ESM server is not available when the Traps agent tries to reach it for a verdict on a file, the file status is marked as Benign.
C. The end user can use the Traps console to override a verdict of Malicious.
D. Local analysis verdicts take precedence over WildFire verdicts.
Answer: A
Question No : 2
By default, where are log entries for the ESM Server and the ESM Console stored?
A. In XML-formatted text files on the server
B. In flat text files on the server
C. In a connected SIEM system
D. In Panorama
E. In the Windows event log on the server
Answer: A
Dumps4download
2018 PSE-Endpoint-Associate Dumps - PSE-Endpoint-Associate PDF - Free Demo
Question No : 3
What is the maximum supported number of endpoints per ESM Server in a Traps 3.4 deployment?
A. 350
B. 16,000
C. 10,000
D. 80,000
Answer: D
Question No : 4
Which three file types will be uploaded automatically to WildFire for examination? (Choose Three.)
A. Application data files that trigger preventions
B. Executables with no previous verdict in the ESM deployment
C. Executables with a verdict overridden by the administrator
D. Executables allowed to run because their publisher is trusted
E. Executables allowed to run by local analysis
F. Application data files opened by the end user
Answer: A,E,F
Authentic
PSE-Endpoint-Associate Exam Study Material - PSE-Endpoint-Associate Briandumps
Dumps4Download
Question No : 5
Which two statements about troubleshooting installation and upgrade problems are true?
(Choose two.)
A. A common cause of ESM Server installation problems is the failure to confirm connectivity to WildFire before running the installer.
B. A common cause of Traps endpoint agent installation problems is the failure to configure the SSL option correctly.
C. ESM Server services will shut down if they are not licensed within 24 hours of being started.
D. Use MSIEXEC with appropriate flags to get more logging detail at installation time.
Answer: A,B
Question No : 6
Traps endpoints send which three items directly to the ESM Server over port 2125 by default? (Choose Three.)
A. Requests for software update packages
B. Verdict requests
C. WildFire malware reports
D. Exploit prevention dumps
E. Prevention events
F. Heartbeats
Answer: A,C,E
Get Daily
PSE-Endpoint-Associate- Exam Updates - PSE-Endpoint-Associate Questions With
Valid Answers
Question No : 7
A user receives an email that has piece of malware as an attachment. Choose the true statement.
A. The piece of malware can work only if a corresponding application is on the user’s system.
B. The piece of malware can do damage only if it makes a connection to a command-andcontrol server.
C. The piece of malware can work only if it begins with a buffer overflow.
D. The piece of malware can work only if the user opens the attachment.
Answer: C
Question No: 8
What can a Traps content update include? (Choose three.)
A. New EPMs
B. Updates to the local-analysis model
C. New trusted root certificates
D. New default policy rules
E. New trusted publishers
F. New Traps endpoint drivers
Answer: B,C,D
March Valid
PSE-Endpoint-Associate Dumps Questions - PSE-Endpoint-Associate Braindumps
Dumps4Download.us
Question No : 9
The administrator uses Restrictions to do what in the ESM Console?
A. restrict which processes will be protected by which EPMs.
B. restrict the execution of executable files.
C. restrict which administrators can set policies.
D. restrict the information displayed to users when the Traps agent blocks an exploit.
Answer: A
Question No : 10
Which two statements about targeted attacks are true? (Choose two.)
A. Exploits typically target vulnerabilities for which there are no patches.
B. Targeted attacks typically employ a combination of software exploits and malware.
C. Computer users can protect themselves effectively against targeted attacks by keeping their systems fully patched and their antivirus signature databases up to date.
D. Attackers may gather information about their intended victims using social media.
Answer: A,B
2018
PSE-Endpoint-Associate Real Exam Questions - PSE-Endpoint-Associate Real
Braindumps Dumps4Download.us