An administrator selects the Discovered Items list in the ICDm to investigate a recent surge in suspicious file activity. What should an administrator do to display only high risk files?
How long does a blacklist task remain in the My Tasks view after its automatic creation?
Which type of security threat is used by attackers to exploit vulnerable applications?
Which default role has the most limited permission in the Integrated Cyber Defense Manager?
Which report template out format should an administrator utilize to generate graphical reports?