Q: 11
Which communication method is utilized within SES to achieve real-time management?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
What type of Threat Defense for Active Directory alarms are displayed after domain
misconfigurations or hidden backdoors are detected?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
What does the Endpoint Communication Channel (ECC) 2.0 allow Symantec EDR to directly connect
to?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
Which IPS signature type is primarily used to identify specific unwanted network traffic?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
An organization identifies a threat in its environment and needs to limit the spread of the threat.
How should the SEP Administrator block the threat using Application and Device Control?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 16
A company allows users to create firewall rules. During the course of business, users are accidentally
adding rules that block a custom internal application.
Which steps should the Symantec Endpoint Protection administrator take to prevent users from
blocking the custom application?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 17
What protection technology should an administrator enable to prevent double executable file names
of ransomware variants like Cryptolocker from running?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 18
If an administrator enables the setting to manage policies from the cloud, what steps must be taken
to reverse this process?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 19
Administrators at a company share a single terminal for configuring Symantec Endpoint Protection.
The administrators want to ensure that each administrator using the console is forced to
authenticate using their individual credentials. They are concerned that administrators may forget to
log off the terminal, which would easily allow others to gain access to the Symantec Endpoint
Protection Manager (SEPM) console.
Which setting should the administrator disable to minimize the risk of non-authorized users logging
into the SEPM console?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2