A user receives an email with an attached data file containing an exploit. What is it's likely effect? (Choose two.)
What can be used to change the uninstall passwords of agents after the initial installation of the ESM Server and the endpoint agent software?
Which two statements about troubleshooting installation and upgrade problems are true? (Choose two.)
Traps endpoints send which three items directly to the ESM Server over port 2125 by default? (Choose three.)