View Mode
Q: 1
Which device page should an administrator view to track the progress of an issued device command?
Options
Q: 2
A user is unknowingly about to connect to a malicious website and download a known threat within a .rar file. All Symantec Endpoint Protection technologies are installed on the client's system. In which feature set order must the threat pass through to successfully infect the system?
Options
Q: 3
Which Symantec Endpoint Protection technology blocks a downloaded program from installing browser plugins?
Options
Q: 4
What is an appropriate use of a file fingerprint list?
Options
Q: 5
What should an administrator know regarding the differences between a Domain and a Tenant in ICDm?
Options
Q: 6
An Application Control policy includes an Allowed list and a Blocked list. A user wants to use an application that is neither on the Allowed list nor on the Blocked list. What can the user do to gain access to the application?
Options
Q: 7
Why is it important for an Incident Responder to copy malicious files to the SEDR file store or create an image of the infected system during the Recovery phase?
Options
Q: 8
Which designation should an administrator assign to the computer configured to find unmanaged devices?
Options
Q: 9
Which report template type should an administrator utilize to create a daily summary of network threats detected?
Options
Q: 10
A Symantec Endpoint Protection (SEP) administrator receives multiple reports that machines are experiencing performance issues. The administrator discovers that the reports happen at about the same time as the scheduled LiveUpdate. Which setting should the SEP administrator configure to minimize I/O when LiveUpdate occurs?
Options
Question 1 of 20 · Page 1 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE