Which statement about two-step authentication is true?
It is the ability to use two separate passwords.
It is the ability to enable biometric authentication.
It is the ability to have a passphrase sent to a mobile device.
It is the ability to use a verification code in conjunction with the correct username and password.
Which disposition can be returned in response to a malware cloud lookup?
Dirty
Virus
Malware
Infected
The FireAMP connector monitors the system for which type of activity?
Vulnerabilities
Enforcement of usage policies
File operations
Authentication activity
When a user initiates a scan, which types of scan are available as options?
scheduled scan, thorough scan, quick scan, network scan
jiffy scan, overnight scan, scan when available, vulnerability scan
flash scan, custom scan, full scan
none, because user-initiated scans are not allowed
TESTED 15 Nov 2024
Copyright © 2014-2024 DumpsBuddy. All Rights Reserved