The FireAMP connector monitors the system for which type of activity?
B. enforcement of usage policies
C. file operations
D. authentication activity
Which disposition can be returned in response to a malware cloud lookup?
The FireAMP Mobile endpoint connector currently supports which mobile OS device?
If a file’s SHA-256 hash is sent to the cloud, but the cloud has never seen the hash before, which
disposition is returned?
Which statement describes an advantage of the FireAMP product?
A. Signatures are pushed to endpoints more quickly than other antivirus products.
B. Superior detection algorithms on the endpoint limit the amount of work the cloud must perform.
C. It provides enterprise visibility.
D. It relies on sandboxing.