how are the events grouped?
When analyzing Application Control data with SmartEvent, using the predefined queries, how are the
events grouped? In order of:
Who is best able to provide the justification for allow…
Who is best able to provide the justification for allowing access to some higher risk applications?
What is the best Rule Track to choose?
In setting up your first Application Control Policy for discovery. What is the best Rule Track to choose?
What component allows the security administrator to dis…
What component allows the security administrator to discover the underlying reasons for accessing
applications?
where can you see application-related logs?
After you enable Application Control, where can you see application-related logs? In:
Which CLI command shows all users/machines and all the …
For troubleshooting purposes, Shira needs to check the currently identified users on the gateway. Which
CLI command shows all users/machines and all the activity records associated with them?
what would need to be enabled on the Security Gateway?
As a Security Administrator, if you wanted to make rules that apply to an access role as well as anapplication, what would need to be enabled on the Security Gateway?
What are the possible options to configure the Identity…
What are the possible options to configure the Identity Sources (user identification methods with Identity
Awareness)?
which would be considered the most dangerous?
Using Event Viewer in SmartEvent, a Security Administrator discovers that the Application Blade has
detected three applications: YouTube, Tor, and PC in IE. Of these three applications, which would be
considered the most dangerous?
Which of the following actions applies to a Risk Level …
Which of the following actions applies to a Risk Level of 1 Very Low?