1.
Regarding a proper Threat Emulation sizing for an environment with 1000 users for web and email traffic which assumptions are correct? 1. 2000 unique files per day within SMTP/S 2. 2500 unique files per day within HTTP/S 3. 7000 unique files per day within SMTP/S 4. 5000 unique files per day within HTTP/s
2.
Which command do you use to monitor the current status of the emulation queue?
3.
Which Blades of the SandBlast Agent are used for remediation?
4.
What's the password for the encrypted malicious file available via the Threat Emulation forensics report?
5.
When running the Threat Emulation first time wizard, which of these is NOT an option for file analysis location?
6.
A Threat Extraction license is always bundled with Threat Emulation.
7.
What attack vectors are protected by using the SandBlast Agent?
8.
How can the SandBlast Agent protect against encrypted archives?
9.
What Mail Transfer Agent is used with SandBlast?
10.
How can CPU Level Emulation detect ROP?