1. Sophos Central Overview v5.
1. TRUE or FALSE: The general setting for bandwidth usage only applies to Windows devices.
This answer can be found in the Getting Started with Sophos Central General Settings
chapter.
Bonne réponse : TRUE
2. Which of the following statements describes peripheral control?
3. Which URL address is used to login to the Sophos Central Admin console?
4. Which 2 of these protection features are used to protect devices when accessing Internet
resources?
2. Sophos Central User Management v5.0
1. Which of the following directory services are supported by Sophos Central?
This answer can be found in the Introduction to Users in Sophos Central chapter.
Bonne réponse : Windows Active Directory or Microsoft Entra ID
2. When configuring Windows Active Directory synchronization with Sophos Central, what
level of access does the user account the AD Sync Utility uses to connect to the domain
require?
This answer can be found in the Getting Started with Directory Synchronization in Sophos
Central chapter.
Bonne réponse : Read access
3. Sophos Central Agent Deployment v5.0
1. Which of the following commands can be used to download the Sophos installer on a
Linux server?
4. Sophos Central Updating v5.0
1. TRUE or FALSE: Devices can be configured to use a different Message Relay from their
Update Cache.
2. TRUE or FALSE: If an Update Cache is deployed, devices do not need direct access to
Sophos Central.
5. Sophos Central Device Management v5.0
1. TRUE or FALSE: A server can only be a member of ONE server group.
2. TRUE or FALSE. Deleting a device from Sophos Central only removes the device, it
does not uninstall the Sophos Endpoint Agent.
3. TRUE or FALSE: A computer can be a member of multiple computer groups.
4. Which 2 of the following does Tamper Protection prevent unauthorized users from
doing?
6. Sophos Central Policies v5.0
1. TRUE or FALSE: New security features are enabled in the threat protection policy by
default.
2. You want to change the reputation level for the detection of low-reputation files.
Which policy do you edit to make this change?
This answer can be found in the Getting Started with the Sophos Central Threat
Protection Policy chapter.
Bonne réponse : Web control
3. Which of the following statements best describes website management?
4. TRUE or FALSE. Exclusions should be specific and target specific users or devices.
5. Which Sophos Central policy protects users against malicious network traffic?
6. Which option in the peripheral control policy should be selected if you want to allow
and log the use of all peripheral devices across a network?
7. Complete the sentence: A content rule used in a Content Control List to…
8. Which of the following statements best describes peripheral control?
9. In which Sophos Central policy can you enable device isolation?
7. Sophos Central Remediation and Reports v5.0
1. What happens when the health status of a device is reset?
2. The Sophos Endpoint Agent is running and active malware has been detected, what is the
expected health status of the device?
3. The Sophos Endpoint Agent is running and no malware has been detected, what is the
expected health status of the device?
4. Complete the sentence.Marking an alert as resolved...
5. When configuring the frequency of email alerts, which 3 of the following can you choose to
base the frequency on?
6. Which log or report allows you to filter the event type returned?
7. Which of the following exclusions is considered the most secure?
8. The Sophos Endpoint Agent is not running on a device, what is the expected health status of
the device?
9. After what time period will an alert be created showing that real-time protection has
been disabled for a computer?
This answer can be found in the Getting Started with Sophos Central Alerts and Events
chapter.
Bonne réponse : 1 heure
8. Sophos Central Detection and Response v5.0
1. To view Sophos Central XDR detections, which setting must be enabled in Sophos
Central?
2. How can you review the commands that have been performed during a Live
Response session?
3. Which type of integration requires authentication information from the product for
configuration?
4. TRUE or FALSE. Sophos Central XDR detections identify unusual and suspicious
activities that have not been blocked.
5. Which type of detections are threat graphs created for?
6. You have selected devices for an endpoint Live Discover query. The 'Run Query'
button is not available. Which of the following could be a solution for this issue?
7. TRUE or FALSE. Only Data Lake Live Discover queries can be scheduled.
8. What are the available pivoting options of a Live Discover query based on?
This answer can be found in the Sophos Central XDR Live Discover Query Pivoting
chapter.
Bonne réponse : online status
9. TRUE or FALSE. Live Response is enabled by default for all administrators with
the Super Admin role.
This answer can be found in the Sophos Central XDR Live Response chapter.
Bonne réponse : FALSE