Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Symantec 250-586 - Endpoint Security Complete Implementation - Technical Specialist

Page: 2 / 3
Total 75 questions

What is the main focus when defining the adoption levels required for features in SE5 Complete?

A.

Customer requirements

B.

Technical specifications

C.

Regulatory compliance

D.

Competitor analysis

Where can information about the validation of in-use features/functions be found during the Manage phase?

A.

Solution Infrastructure Design

B.

Solution Configuration Design

C.

Test Plan

D.

Business or Technical Objectives

In the case of cloud-based architecture, what should be indicated in the Base Architecture section of the SES Complete Solution Design?

A.

The Tenant and domain structure

B.

The major on-premise components

C.

The replication and failover design

D.

The Initial Test Plan

What does SES Complete offer customers in terms of deployment options?

A.

Cloud-based only

B.

On-premises only

C.

Hybrid, cloud-based and on-premises

D.

Hybrid or on-premises only

Which policy should an administrator edit to utilize the Symantec LiveUpdate server for pre-release content?

A.

The System Policy

B.

The LiveUpdate Policy

C.

The System Schedule Policy

D.

The Firewall Policy

What happens if a SEP Manager replication partner fails in a multi-site SEP Manager implementation?

A.

Clients for that site connect to the remaining SEP Managers

B.

Replication continues and reporting is delayed

C.

Replication is stopped and managed devices discontinue protection

D.

Clients for that site do not connect to remaining SEP Managers but date is retained locally

When a SEPM is enrolled in ICDm which policy can only be managed from the cloud?

A.

Firewall

B.

Network Intrusion Prevention

C.

LiveUpdate

D.

Intensive Protection

Why is it important to research the customer prior to arriving onsite?

A.

To review the supporting documentation

B.

To understand recent challenges

C.

To align client expectations with consultant expectations

D.

To understand the customer and connect their needs to the technology

What does the Base Architecture section of the Infrastructure Design provide?

A.

The mapping of the chosen implementation model

B.

The methods for consistent and reliable delivery of agent installation packages

C.

The approach to endpoint enrollment or agent installation

D.

The illustration of the solution topology and component placement

What permissions does the Security Analyst Role have?

A.

Search endpoints, trigger dumps, create policies

B.

Trigger dumps, get and quarantine files, enroll new sites

C.

Search endpoints, trigger dumps, get and quarantine files

D.

Trigger dumps, get and quarantine files, create device groups