New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

250-428 Questions and Answers

Question # 6

A Symantec Endpoint Protection (SEP) administrator is remotely deploying SEP clients, but the clients are failing to install on Windows XP.

What are two possible reasons for preventing installation? (Select two.)

A.

Windows firewall is enabled.

B.

Internet Connection firewall is disabled.

C.

Administrative file shares are enabled.

D.

Simple file sharing is enabled.

E.

Clients are configured for DHCP.

Full Access
Question # 7

A financial company enforces a security policy that prevents banking system workstations from connecting to the Internet.

Which Symantec Endpoint Protection technology is ineffective on this company's workstations?

A.

Insight

B.

Intrusion Prevention

C.

Network Threat Protection

D.

Browser Intrusion Prevention

Full Access
Question # 8

An administrator receives a browser certificate warning when accessing the Symantec Endpoint Protection Manager (SEPM) Web console.

Where can the administrator obtain the certificate?

A.

SEPM console Licenses section

B.

Admin > Servers > Configure SecureID Authentication

C.

SEPM console Admin Tasks

D.

SEPM Web Access

Full Access
Question # 9

Which protection engine should an administrator enable in order to drop malicious vulnerability scans against a client system?

A.

SONAR

B.

Intrusion Prevention

C.

Application and Device Control

D.

Tamper Protection

Full Access
Question # 10

An administrator needs to configure Secure Socket Layer (SSL) communication for clients. In the httpd.conf file, located on the Symantec Endpoint Protection Manager (SEPM), the administrator removes the hashmark (#) from the text string displayed below.

#Include conf/ssl/sslForcClients.conf<

Which two tasks must the administrator perform to complete the SSL configuration? (Select two.)

A.

edit site.properties and change the port to 443

B.

restart the Symantec Endpoint Protection Manager Webserver service

C.

change the default certificates on the SEPM and reboot

D.

change the Management Server List and enable HTTPs

E.

change the port in Clients > Group > Policies > Settings > Communication Settings and force the clients to reconnect

Full Access
Question # 11

Which action does SONAR take before convicting a process?

A.

Checks the reputation of the process

B.

Restarts the system

C.

Quarantines the process

D.

Blocks suspicious behavior

Full Access
Question # 12

An administrator uses the search criteria displayed in the image below.

Which results are returned from the query?

A.

Only VMware Servers in the Default Group

B.

All Windows 2012 Servers in the Default Group

C.

Only Windows 2012 Servers that are Virtualized in the Default Group

D.

All Windows 2012 Servers and all Virtualized Servers in the Default Group

Full Access
Question # 13

Which Symantec Endpoint Protection component enables access to data through ad-hoc reports and charts with pivot tables?

A.

Symantec Protection Center

B.

Shared Insight Cache Server

C.

Symantec Endpoint Protection Manager

D.

IT Analytics

Full Access
Question # 14

What is an appropriate use of a file fingerprint list?

A.

allow unknown files to be downloaded with Insight

B.

prevent programs from running

C.

prevent AntiVirus from scanning a file

D.

allow files to bypass Intrusion Prevention detection

Full Access
Question # 15

A user is unknowingly about to connect to a malicious website and download a known threat within a .rar file. All Symantec Endpoint Protection technologies are installed on the client's system.

In which feature set order must the threat pass through to successfully infect the system?

A.

Download Insight, Firewall, IPS

B.

Firewall, IPS, Download Insight

C.

IPS, Firewall, Download Insight

D.

Download Insight, IPS, Firewall

Full Access
Question # 16

Administrators at a company share a single terminal for configuring Symantec Endpoint Protection. The administrators want to ensure that each administrator using the console is forced to authenticate using their individual credentials. They are concerned that administrators may forget to log off the terminal, which would easily allow others to gain access to the Symantec Endpoint Protection Manager (SEPM) console.

Which setting should the administrator disable to minimize the risk of non-authorized users logging into the SEPM console?

A.

allow users to save credentials when logging on

B.

delete clients that have not connected for specified time

C.

lock account after the specified number of unsuccessful logon attempts

D.

allow administrators to reset the passwords

Full Access
Question # 17

An administrator plans to implement a multi-site Symantec Endpoint Protection (SEP) deployment. The administrator needs to determine whether replication is viable without needing to make network firewall changes or change defaults in SEP.

Which port should the administrator verify is open on the path of communication between the two proposed sites?

A.

1433

B.

2967

C.

8014

D.

8443

Full Access
Question # 18

Which package type should an administrator use to reduce a SEP environment’s footprint when considering that new SEP 14 clients will be installed on point of sale terminals?

A.

Default Standard Client

B.

Default Embedded or VDI client

C.

Default dark network client

D.

Custom Standard client

Full Access
Question # 19

A system running Symantec Endpoint Protection is assigned to a group with client user interface control settings set to mixed mode with Auto-Protect options set to Client. The user on the system is unable to turn off Auto-Protect.

What is the likely cause of this problem?

A.

Tamper protection is enabled.

B.

System Lockdown is enabled.

C.

Application and Device Control is configured.

D.

The padlock on the enable Auto-Protect option is locked.

Full Access
Question # 20

Refer to the exhibit.

A manufacturing company runs three shifts at their Bristol Sales office. These employees currently share desktops in the B_Desktops group. The administrators need to apply different policies/configurations for each shift.

Which step should the administrator take in order to implement shift policies after switching the clients to user mode?

A.

create three shift policies for the Bristol group

B.

create a group for each shift of users in the Bristol group

C.

turn on inheritance for all groups in England

D.

turn on Active Directory integration

E.

modify the B_Desktops policy

Full Access