Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Symantec 250-428 - Administration of Symantec Endpoint Protection 14

Page: 4 / 4
Total 135 questions

What SEPM report should an administrator utilize to view the files that Download Insight detected on your computers, after configuring Download Insight?

A.

Risk Distribution

B.

SONAR Detection Results

C.

Risk Detections Count

D.

Download Risk Distribution

Match the following list of ports used by Symantec Endpoint Protection (SEP) to the defining characteristics by clicking and dragging the port on the left to the corresponding description on the right.

A Symantec Endpoint Protection administrator must block traffic from an attacking computer for a specific time period.

Where should the administrator adjust the time to block the attacking computer?

A.

In the group policy, under External Communication settings

B.

In the group policy, under Communication settings

C.

In the firewall policy, under Protection and Stealth

D.

In the firewall policy, under Built in Rules

A Symantec Endpoint Protection administrator needs to comply with a service level agreement stipulating that all definitions must be internally quality assurance tested before being deployed to customers.

Which step should the administrator take?

A.

install a LiveUpdate Administrator Server

B.

install a Shared Insight Cache Server

C.

install a Group Update Provider (GUP) to the existing site

D.

install a Symantec Protection Center

An organization employs laptop users who travel frequently. The organization needs to acquire log data from these Symantec Endpoint Protection clients periodically. This must happen without the use of a VPN.

Internet routable traffic should be allowed to and from which component?

A.

Group Update Provider (GUP)

B.

LiveUpdate Administrator Server (LUA)

C.

Symantec Endpoint Protection Manager (SEPM)

D.

IT Analytics Server (ITA)

An administrator plans to implement a multi-site Symantec Endpoint Protection (SEP) deployment. The administrator needs to determine whether replication is viable without having to make network firewall changes or change defaults in SEP.

Which port should the administrator verify is open on the path of communication between the two proposed sites? (Type the port number.)

Which task is unavailable for administrative accounts that authenticate using RSA SecurID Authentication?

A.

reset forgotten passwords

B.

import organizational units (OU) from Active Directory

C.

configure external logging

D.

enable Session Based Authentication with Web Services

Which two criteria should an administrator use when defining Location Awareness for the Symantec Endpoint Protection (SEP) client? (Select two.)

A.

NIC description

B.

SEP domain

C.

geographic location

D.

WINS server

E.

Network Speed

A system running Symantec Endpoint Protection is assigned to a group with client user interface control settings set to mixed mode with Auto-Protect options set to Client. The user on the system is unable to turn off Auto-Protect.

What is the likely cause of this problem?

A.

Tamper protection is enabled.

B.

System Lockdown is enabled.

C.

Application and Device Control is configured.

D.

The padlock on the enable Auto-Protect option is locked.

Which ports on the company firewall must an administrator open to avoid problems when connecting to Symantec Public LiveUpdate servers?

A.

25, 80, and 2967

B.

2967, 8014, and 8443

C.

21, 443, and 2967

D.

21, 80, and 443