Q: 1
Which device page should an administrator view to track the progress of an issued device command?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
A user is unknowingly about to connect to a malicious website and download a known threat within
a .rar file. All Symantec Endpoint Protection technologies are installed on the client's system.
In which feature set order must the threat pass through to successfully infect the system?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
Which Symantec Endpoint Protection technology blocks a downloaded program from installing
browser plugins?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
What is an appropriate use of a file fingerprint list?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
What should an administrator know regarding the differences between a Domain and a Tenant in
ICDm?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
An Application Control policy includes an Allowed list and a Blocked list. A user wants to use an
application that is neither on the Allowed list nor on the Blocked list. What can the user do to gain
access to the application?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
Why is it important for an Incident Responder to copy malicious files to the SEDR file store or create
an image of the infected system during the Recovery phase?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
Which designation should an administrator assign to the computer configured to find unmanaged
devices?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
Which report template type should an administrator utilize to create a daily summary of network
threats detected?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 10
A Symantec Endpoint Protection (SEP) administrator receives multiple reports that machines are
experiencing performance issues. The administrator discovers that the reports happen at about the
same time as the scheduled LiveUpdate.
Which setting should the SEP administrator configure to minimize I/O when LiveUpdate occurs?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2