Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Symantec 250-561 - Endpoint Security Complete - Administration R1

Page: 1 / 3
Total 70 questions

Which SES advanced feature detects malware by consulting a training model composed of known good and known bad fries?

A.

Signatures

B.

Advanced Machine Learning

C.

Reputation

D.

Artificial Intelligence

Which option should an administrator utilize to temporarily or permanently block a file?

A.

Delete

B.

Hide

C.

Encrypt

D.

Blacklist

Which two (2) skill areas are critical to the success of incident Response Teams (Select two)

A.

Project Management

B.

Incident Management

C.

Cyber Intelligence

D.

Incident Response

E.

Threat Analysis

Which policy should an administrator edit to utilize the Symantec LiveUpdate server for pre-release content?

A.

The Firewall Policy

B.

The System Schedule Policy

C.

The System Policy

D.

The LiveUpdate Policy

Wh.ch Firewall rule components should an administrator configure to block facebook.com use during business hours?

A.

Action, Hosts(s), and Schedule

B.

Action, Application, and Schedule

C.

Host(s), Network Interface, and Network Service

D.

Application, Host(s), and Network Service

An administrator suspects that several computers have become part of a botnet. What should the administrator do to detect botnet activity on the network?

A.

Enable the Command and Control Server Firewall

B.

Add botnet related signatures to the IPS policy's Audit Signatures list

C.

Enable the IPS policy's Show notification on the device setting

D.

Set the Antimalware policy's Monitoring Level to 4

Which communication method is utilized within SES to achieve real-time management?

A.

Heartbeat

B.

Standard polling

C.

Push Notification

D.

Long polling

Which statement best defines Machine Learning?

A.

A program that needs user input to perform a task.

B.

A program that teams from observing other programs.

C.

A program that learns from experience to optimize the output of a task.

D.

A program that require data to perform a task.

What are two (2) benefits of a fully cloud managed endpoint protection solution? (Select two)

A.

Increased content update frequency

B.

Increased visibility

C.

Reduced 3rd party licensing cost

D.

Reduced database usage

E.

Reduced network usage

Which report template out format should an administrator utilize to generate graphical reports?

A.

XML

B.

HTML

C.

PFD

D.

XML