What is the purpose of the Compare tool?
Which action must be taken before a host can enforce rules when it has been moved to a new group?
What are the three options that can be given to a user when a Query User window appears?
Which action do you take when you are ready to deploy your CSA configuration to systems?
Which three make up the CSA architecture model?
What application is installed on the server after the CSA MC is installed?
What status is shown when an Agent kit is prepared for downloading to hosts?
Which attack could an attacker use during the propagate phase of an attack?
which layers of the OSI reference model does CSA enforce security?
How can the Agent kit be sent out to host machines?