1.
Which of these is a reason for using groups to administer Agents?
2.
Which action do you take when you are ready to deploy your CSA configuration to systems?
3.
Which one of the five phases of an attack attempts to become resident on a target?
4.
What is the purpose of the Audit Trail function?
5.
In which type of rules are network address sets used?
6.
When should you use preconfigured application classes for application deployment investigation?
7.
What is the purpose of network access control rules?
8.
What is the purpose of the Compare tool?
9.
For which operating system is the network shield rule available?
10.
What is the maximum number of characters that a policy name can contain?