Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Symantec 250-428 - Administration of Symantec Endpoint Protection 14

Page: 1 / 4
Total 135 questions

Which setting can an administrator configure in the LiveUpdate policy?

A.

Linux Settings

B.

Frequency to download content

C.

Specific content revision to download from a Group Update Provider (GUP)

D.

Specific content policies to download

Which technology can prevent an unknown executable from being downloaded through a browser session?

A.

Browser Intrusion Prevention

B.

Download Insight

C.

Application Control

D.

SONAR

An organization recently experienced an outbreak and is conducting a health check of their environment! What Protection Technology should the SEP team enable to prevent vulnerability attacks on software?

A.

Memory Exploit Mitigation (MEM)

B.

System Lockdown

C.

Behavior Monitoring (SONAR)

D.

Host Integrity

What is the difference between a shared and non-shared policy?

A.

Shared policies can be edited and replaced for all groups and locations that use it. A non-shared policy is unique to a specific group or location.

B.

Shared policies are replicated to a Replication Partner. A non-shared policy is specific to a local SEPM site.

C.

Shared policies are used in Production. A non-shared policy is used in test and only work in Log Only mode.

D.

Shared policies are unique for a specific group and location. A nonshared policy can be edited and replaced for all groups and locations that use it.

Which two criteria should an administrator use when defining Location Awareness for the Symantec Endpoint Protection (SEP) client? (Select two.)

A.

SEP domain

B.

WINS server

C.

Network Speed

D.

NIC description

E.

geographic location

A threat was detected by Auto-Protect on a client system.

Which command can an administrator run to determine whether additional threats exist?

A.

Restart Client Computer

B.

Update Content and Scan

C.

Enable Network Threat Protection

D.

Enable Download Insight

An administrator selects the Backup files before attempting to repair the Remediations option in the Auto-Protect policies.

Which two actions occur when a virus is detected? (Select two.)

A.

replace the file with a place holder

B.

check the reputation

C.

store in Quarantine folder

D.

send the file to Symantec Insight

E.

encrypt the file

An administrator is responsible for the Symantec Endpoint Protection architecture of a large, multi-national company with three regionalized data centers. The administrator needs to collect data from clients; however, the collected data must stay in the local regional data center. Communication between the regional data centers is allowed 20 hours a day.

How should the administrator architect this organization?

A.

Set up 3 domains

B.

Set up 3 sites

C.

Set up 3 groups

D.

Set up 3 locations

Where can an administrator obtain the Sylink.xml file?

A.

C:\Program Files\Symantec\Symantec Endpoint Protection\ folder on the client

B.

C:\Program Files\Symantec\Symantec Endpoint Protection\Manager\data\inbox\agent\ folder on the Symantec Endpoint Protection Manager

C.

by selecting the client group and exporting the communication settings in the Symantec Endpoint Protection Manager Console

D.

by selecting the location and exporting the communication settings in the Symantec Endpoint Protection Manager Console

An administrator is re-adding an existing Replication Partner to the local Symantec Endpoint Protection Manager site.

Which two parameters are required to re-establish this replication partnership? (Select two.)

A.

Remote site Encryption Password

B.

Remote server IP Address and port

C.

Remote SQL database account credentials

D.

Remote server Administrator credentials

E.

Remote site Domain ID