SOPHOS

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/114

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:19 PM on 7/15/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

115 Terms

1
New cards

Which TCP port is used to communicate policies to endpoints?

8190

2
New cards

Which Sophos Central manage product protects the data on a lost or stolen laptop?

Encryption

3
New cards

The option to stop the AutoUpdate service is greyed out in Windows Services. What is the most likely reason for this?

Tamper Protection is enabled

4
New cards

Complete the sentence: Signature-based file scanning relies on…

previously detected malware characteristics

5
New cards

TRUE or FALSE: Tamper protection is enabled by default.

TRUE

6
New cards

You are unable to edit policies in Sophos Central. What do you check in Sophos Central?

That you have the correct role assigned

7
New cards

Which URL address do you use to login to Sophos Central Partner Dashboard?

partnerportal.sophos.com

8
New cards

You are detecting low-reputation files and want to change the reputation level from recommended to strict. Which policy do you edit to make this change?

Threat Protection

9
New cards

What is the FIRST step you must take when deploying virtual environments?

Check the system requirements

10
New cards

You want to prevent users from copying database files to USB drives without blocking the use of all USB devices. Which policy do you need to configure?

Data Loss Prevention

11
New cards

TRUE or FALSE: You can search for a malicious item across your network using EDR

TRUE

12
New cards

Which log provides a record of all activities?

Audit log

13
New cards

What is the function of anti-exploit technology?

To detect and stop compromised vulnerable applications

14
New cards

Complete the sentence: The SAV32CLI clean-up tool is a…

Command line tool included in Sophos Central installation

15
New cards

When registering for a Sophos Central Trial, which of the following statements are TRUE?

You must use an email address that has not been used with Sophos Central before

16
New cards

Which tab on the device details page displays the tamper protection information?

SUMMARY

17
New cards

What is the function of Live Protection?

Connects to a cloud server to check for the latest information about a file

18
New cards

How long are activities stored for in the Enterprise Dashboard?

90 days

19
New cards

What is the function of an Update Cache?

To download updates from Sophos Central and store them on a dedicated server on your network

20
New cards

What is the function of on-access scanning?

Monitors running processes' behavior

21
New cards

Which of the following alerts is categorized as a high alert?

Failed to protect an endpoint

22
New cards

Which dashboard allows you to manage and apply global settings to multiple Sophos Central accounts?

The Partner Dashboard

23
New cards

Which detection feature can prevent attacks on the master boot record?

WipeGuard

24
New cards

What is the function of a Message Relay?

To enable all devices to communicate all policy and reporting data using a dedicated server on your network

25
New cards

True or False: Marking an alert as acknowledge will resolve the threat on the endpoint.

FALSE

26
New cards

Which TCP port is used to communicate Updates on endpoints?

8191

27
New cards

TRUE or FALSE: The security VM installer is linked to your Sophos Central account.

FALSE

28
New cards

TRUE or FALSE: You can deploy an update cache without a Message Relay.

TRUE

29
New cards

You want to change an action for 'confidential' content. Where in Sophos Central do you make this change?

In the Data Loss Prevention Rule

30
New cards

What does HIPS do on a protected endpoint?

Scans for potentially malicious behaviour

31
New cards

You have cloned the threat protection base policy, applied the policy to a group and saved it. When checking the endpoint, the policy changes have not taken effect. What do you check in the policy?

That the cloned policy has been enforced

32
New cards

In which 2 ways can you license the Enterprise Dashboard?

(1) Master Licensing

33
New cards

(2) Individual Licensing

34
New cards

What is the minimum administrative role that will allow a user to create and edit policies?

Admin

35
New cards

Complete the following sentence: The default protection base policy is configured with…

Sophos' recommended settings

36
New cards

Which section in the Self-Help tool should be checked to start investigating an updating issue on an endpoint

System

37
New cards

What does tamper protection prevent a user from doing on their endpoint with Sophos Central agent installed?

Prevents a user from uninstalling the Sophos agent software

38
New cards

TRUE or FALSE: All server protection features are enabled by default.

FALSE

39
New cards

Which endpoint protection policy protects users against malicious network traffic?

Threat Protection

40
New cards

Which is the minimum administrative role that will allow a user to view alerts, perform updates and scan endpoints?

Help Desk

41
New cards

Your Enterprise Dashboard has been configured with multiple sub-estates. In which 2 ways can you manage the licenses associated with the sub-estates?

(1) In the sub-estate Central Admin Console

42
New cards

(2) In the Enterprise Dashboard

43
New cards

Threat search results are split into which 2 of the following.

(1) Files

44
New cards

(2) Network

45
New cards

In which policy do you configure anti-virus scanning?

Threat Protection

46
New cards

Which feature of Intercept X is designed to detect malware before it can execute?

Exploit technique detection

47
New cards

True or False: You can choose to send email alerts immediately, hourly, daily or never.

True

48
New cards

An endpoint is reporting that Sophos AutoUpdate is not installed. In the Self-Help Tool which tab do you check to view whether AutoUpdate is listed as installed?

Installed components

49
New cards

A Windows endpoint installation is failing. It is detecting competitor software. Which log file do you check to investigate this issue?

avremove.log

50
New cards

How do users view quarantined emails and manage device encryption for their protected endpoints?

The Self-Service Portal

51
New cards

Which 2 of the following are the methods for bulk importing users?

(1) Using the Active Directory Sync Utility

52
New cards

(2) Import using a CSV file

53
New cards

You want to configure the login settings for all administrators to require two factors of authentication. Which global setting do you enable?

Multi-factor Authentication

54
New cards

When protecting a Mac client, you must know the password of the administrator.

TRUE

55
New cards

What is the function of Data Loss Prevention?

To monitor and restrict file transfers containing sensitive data

56
New cards

For most detections, which clean-up process is used to clean up the detection?

Automatic Clean Up

57
New cards

Which endpoint protection policy block access to malicious websites?

Threat Protection

58
New cards

What is the recommended way to allow a new application to a locked down server?

Add the path of the application to the server lockdown policy

59
New cards

Which security threat does Intercept X protect against?

Ransomware

60
New cards

You want to mitigate exploits in vulnerable applications. Which policy do you enable the features in?

Threat Protection

61
New cards

True or False: The Sophos Central Partner Portal can be used to manage customers' XG Firewalls.

TRUE

62
New cards

TRUE or FALSE: A Message Relay can be configured on a Server without an Update Cache.

FALSE

63
New cards

You have created a new policy. Which tab do you select to enable the policy?

POLICY BYPASSED

64
New cards

True or False: Multi-factor authentication is enabled by default for all Enterprise Administrators.

TRUE

65
New cards

What is the function of Peripheral Control?

To prevent the use of removable media on protected endpoints

66
New cards

TRUE or FALSE: Deleting an endpoint in Sophos Central will remove the Endpoint agent from the endpoint.

FALSE

67
New cards

What is the function of Sophos Synchronized Security?

To connect Sophos security solutions in real time

68
New cards

TRUE or FALSE: Tamper protection must be disabled before removing Endpoint Protection.

TRUE

69
New cards

What is the Sophos recommended Active Directory sync interval?

Once a day

70
New cards

A malicious file has been detected on an endpoint and you want to prevent lateral movement through your network. From the threat case, which action do you take?

Isolate the computer

71
New cards

Which 2 places in Sophos Central do you add exclusions for servers?

(1) Global Settings

72
New cards

(2) Server Policy

73
New cards

TRUE or FALSE: The security VM installer is linked to your Sophos Central account.

FALSE

74
New cards

Which is the minimum administrative role that will allow a user to view alerts and logs?

Read Only

75
New cards

What is the minimum administrative role that will allow a user to scan endpoints?

Help Desk

76
New cards

TRUE or FALSE: Base policies can be disabled in Sophos Central.

FALSE

77
New cards

Which is the function of Application Control?

To block specific applications from running on protected endpoints

78
New cards

Which 2 of the following are monitored when File Integrity Monitoring is enabled?

(1) Files

79
New cards

(2) Registry Entries

80
New cards

Which report will give you information across all protected endpoints?

Events report

81
New cards

Where can an administrator view the license management types in the Enterprise Dashboard?

Licensing

82
New cards

Which Sophos support tool do you use to find out the latest information about security threats?

SophosLabs

83
New cards

True or False: Multi-factor authentication is enabled by default for all Enterprise Administrators.

TRUE

84
New cards

Which of the following is a pre-execution check performed by Intercept X?

Machine learning

85
New cards

What is the function of Web Control?

To control access to websites based on their category

86
New cards

Where in Sophos Central Admin Console can you enable remote assistance?

Account Details

87
New cards

Complete the sentence: The Source of Infection clean up tool is a…

Tool that identified where malicious files are written from

88
New cards

TRUE or FALSE: All Endpoints have the same tamper protection password.

FALSE

89
New cards

Which dashboard allows you to view and apply global settings to multiple Sophos Central Accounts?

The Enterprise Dashboard

90
New cards

In which policy do you enable deep learning?

Threat Protection

91
New cards

What is the minimum administrative role that will allow a user to manage user roles and role assignments?

Super Admin

92
New cards

You need to give a user access to change their protection settings in an emergency. Which 2 of the following allow you to do this?

(1) Disable tamper protection for their endpoint

93
New cards

(2) Provide the user with the tamper protection password

94
New cards

Complete the sentence: The Virus Removal clean up tool is a…

Separate download that detects and removes malware

95
New cards

Which feature allows you to restrict applications on a server?

Server lockdown

96
New cards

How do you access a managed Sophos Central account to resolve alerts for your customer?

Login using the Launch Sophos Central Admin button in the Partner Dashboard

97
New cards

Which is the minimum administrative role that will allow a user access to view and edit policies?

Admin

98
New cards

You want to check an endpoint has received the latest policy updates from Sophos Central. Which tab do you select in the Endpoint Self-Help tool to view the last communication date and time?

Management Communication

99
New cards

Which 2 components are required for protecting virtual environments?

(1) Security Virtual Machine (SVM)

100
New cards

(2) Guest Virtual Machine (GVM)