Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Symantec 250-428 - Administration of Symantec Endpoint Protection 14

Page: 2 / 4
Total 135 questions

Which two options are supported Symantec Endpoint Manager authentication types? (Select two.)

A.

Network Access Control

B.

Biometrics

C.

RSA SecurID

D.

MS-CHAP

E.

Microsoft Active Directory

An administrator uses ClientSideClonePrepTool to clone systems and virtual machine deployment. What will the tool do when it is run on each system?

A.

run Microsoft SysPrep and removes all AntiVirus/AntiSpyware definitions

B.

disable Tamper Protect and deploys a Sylink.xml

C.

add a new Extended File Attribute value to all existing files

D.

remove unique Hardware IDs and GUIDs from the system

What optional Symantec Endpoint Protection component could an administrator utilize if an organization requires custom reports and queries?

A.

Q-Radar

B.

Splunk

C.

Crystal Reports

D.

IT Analytics

A Symantec Endpoint Protection administrator is using System Lockdown in blacklist mode with a file fingerprint list. When testing a client, the administrator notices that at least one of the files on the list is allowed to execute.

What is the likely cause of the problem?

A.

The application has been upgraded.

B.

The Application and Device Control policy is in test mode.

C.

A file exception has been added to the Exceptions policy.

D.

The Application and Device Control policy is allowing the file to execute.

What is the file scan workflow order when Shared Insight Cache and reputation are enabled?

A.

Symantec Insight > Shared Insight Cache server > local client Insight cache

B.

Local client Insight cache > Shared Insight Cache server > Symantec Insight

C.

Shared Insight Cache server > local client Insight cache > Symantec Insight

D.

Local client Insight cache > Symantec Insight > Shared Insight Cache server

What is a valid Symantec Endpoint Protection (SEP) single site design?

A.

Multiple MySQL databases

B.

One Microsoft SQL Server database

C.

One Microsoft SQL Express database

D.

Multiple embedded databases

An administrator is reviewing an Infected Clients Report and notices that a client repeatedly shows the same malware detection. Although the client remediates the files, the infection continues to display in the logs.

Which two functions should be enabled to automate enhanced remediation of a detected threat and its related side effects? (Select two.)

A.

Stop Service Automatically

B.

Stop and Reload AutoProtect

C.

Terminate Processes Automatically

D.

Risk Tracer

E.

Early Launch Anti-Malware Driver

Which tool should an administrator use to discover and deploy the Symantec Endpoint Protection client to new computers?

A.

Unmanaged Detector

B.

Client Deployment Wizard

C.

Communication Update Package Deployment

D.

Symantec Endpoint Discovery Tool

Which two items should an administrator enter in the License Activation Wizard to activate a license? (Select two.)

A.

password for the Symantec Licensing Site

B.

purchase order number

C.

serial number

D.

Symantec License file

E.

credit card number

An administrator changes the Virus and Spyware Protection policy for a specific group that disables Auto-Protect. The administrator assigns the policy and the client systems apply the corresponding policy serial number. Upon visual inspection of a physical client system, the policy serial number is correct. However, Auto-Protect is still enabled on the client system.

Which action should the administrator take to ensure that the desired setting is in place on the client?

A.

Restart the client system.

B.

Enable the padlock next to the setting in the policy.

C.

Run a command on the computer to Update Content

D.

Withdraw the Virus and Spyware Protection policy