Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Symantec 250-428 - Administration of Symantec Endpoint Protection 14

Page: 3 / 4
Total 135 questions

A company needs to configure an Application and Device Control policy to block read/write access to all USB removable media on its Symantec Endpoint Protection (SEP) systems.

Which tool should an administrator use to format the GUID and device IDs as required by SEP?

A.

CheckSum.exe

B.

DevViewer.exe

C.

TaskMgr.exe

D.

DeviceTree.exe

Which action should an administrator take to prevent users from using Windows Security Center?

A.

Set Disable antivirus alert within Windows Security Center to Disable

B.

Set Disable Windows Security Center to Always

C.

Set Disable Windows Security Center to Disable

D.

Set Disable antivirus alert within Windows Security Center to Never

Which Symantec Endpoint Protection defense mechanism provides protection against threats that propagate from system to system through the use of autorun.inf files?

A.

Host Integrity

B.

SONAR

C.

Application and Device Control

D.

Emulator

Which two criteria are used by Symantec Insight to evaluate binary executables? (Select two.)

A.

Age

B.

Prevalence

C.

Sensitivity

D.

Confidentiality

E.

Content

A Symantec Endpoint Protection Manager (SEPM) administrator notices performance issues with the SEPM server. The Client tab becomes unresponsive in the SEPM console and .DAT files accumulate in the “agentinfo” folder.

Which tool should the administrator use to gather log files to submit to Symantec Technical Support?

A.

collectLog.cmd

B.

LogExport.exe

C.

smc.exe

D.

ExportLog.vbs

What is an appropriate use of a file fingerprint list?

A.

allow unknown files to be downloaded with Insight

B.

prevent programs from running

C.

prevent AntiVirus from scanning a file

D.

allow files to bypass Intrusion Prevention detection

Which action can an administrator take to improve the Symantec Endpoint Protection Manager (SEPM) dashboard performance and report accuracy?

A.

Rebuilding database indexes

B.

Lowering the client installation log entries

C.

Limiting the number of backups to keep

D.

Decreasing the number of content revisions to keep

Refer to the exhibit.

An administrator has configured the Symantec Endpoint Protection Manager (SEPM) to use Active Directory authentication. The administrator defines a new Symantec Endpoint Protection administrator named Sep_SysAdmin, configured to use Directory Authentication.

Which password needs to be entered when the administrator logs in to the SEPM console as Sep_SysAdmin?

A.

The password for the Active Directory account Nova_Grant

B.

The password for the SEPM account Nova_Grant

C.

The password for the Active Directory account Sep_SysAdmin

D.

The password for the SEPM account Sep_SysAdmin

A Symantec Endpoint Protection (SEP) client uses a management server list with three management servers in the priority 1 list.

Which mechanism does the SEP client use to select an alternate management server if the currently selected management server is unavailable?

A.

The client chooses the next server alphabetically by server name.

B.

The client chooses another server alphabetically in the list randomly.

C.

The client chooses a server with the next highest IP address.

D.

The client chooses a server based on the lowest server load.

When can an administrator add a new replication partner?

A.

immediately following the first LiveUpdate session of the new site

B.

during a Symantec Endpoint Protection Manager upgrade

C.

during the initial install of the new site

D.

immediately following a successful Active Directory sync