Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Symantec 250-561 - Endpoint Security Complete - Administration R1

Page: 2 / 3
Total 70 questions

Which report template type should an administrator utilize to create a daily summary of network threats detected?

A.

Network Risk Report

B.

Blocked Threats Report

C.

Intrusion Prevention Report

D.

Access Violation Report

In which phase of MITRE framework would attackers exploit faults in software to directly tamper with system memory?

A.

Exfiltration

B.

Discovery

C.

Execution

D.

Defense Evasion

Which framework, open and available to any administrator, is utilized to categorize adversarial tactics and for each phase of a cyber attack?

A.

MITRE RESPONSE

B.

MITRE ATT&CK

C.

MITRE ADV&NCE

D.

MITRE ATTACK MATRIX

How long does a blacklist task remain in the My Tasks view after its automatic creation?

A.

180 Days

B.

30 Days

C.

60 Days

D.

90 Days

Which type of organization is likely to be targeted with emerging threats?

A.

Small organization with externalized managed security

B.

Large organizations with dedicated security teams

C.

Large organization with high turnover

D.

Small organization with little qualified staff

Which two (2) scan range options are available to an administrator for locating unmanaged endpoints? (Select two)

A.

IP range within network

B.

IP range within subnet

C.

Entire Network

D.

Entire Subnet

E.

Subnet Range

Which Anti-malware technology should an administrator utilize to expose the malicious nature of a file created with a custom packet?

A.

Sandbox

B.

SONAR

C.

Reputation

D.

Emulator

Which Security Control dashboard widget should an administrator utilize to access detailed areas for a given security control ?

A.

Learn More

B.

Quick Links

C.

More Info

D.

Latest Tasks

Which security control is complementary to IPS, providing a second layer of protection against network attacks?

A.

Host Integrity

B.

Antimalware

C.

Firewall

D.

Network Protection

What option must an administrator choose when rolling back a policy assignment to a previous version?

A.

Customize

B.

Reverse

C.

Override

D.

Go Back