Prepare for the Sophos Certified Engineer Exam. Study with our comprehensive quiz featuring multiple-choice questions, hints, and explanations. Equip yourself with the knowledge you need to succeed!

Practice this question and more.


In which policy do you enable device isolation?

  1. Access Control

  2. Threat Protection

  3. Application Control

  4. Data Loss Prevention

The correct answer is: Access Control

Enabling device isolation is primarily associated with network security and access controls. In the context of Sophos solutions, the Access Control policy governs how devices can communicate within a network, including configurations that can isolate devices from each other. Device isolation can help prevent unauthorized access and limit the spread of potential threats by restricting communication between devices. This feature is critical in environments where security is a priority, allowing you to create rules that manage and tighten access based on device trust levels. Thus, the Access Control policy is the appropriate place to enable device isolation, ensuring that you can effectively manage and secure network traffic among devices as per the security protocols established in your organization. The other policies listed—Threat Protection, Application Control, and Data Loss Prevention—focus on different aspects of security that do not explicitly deal with network access and isolation mechanisms. Threat Protection deals with detecting and responding to malicious activities, Application Control regulates the use of applications within the network, and Data Loss Prevention focuses on safeguarding critical information against unauthorized access and leaks.