In the virus and Spyware Protection policy, an administrator sets the First action to Clean risk and sets If first action fails to Delete risk. Which two (2) factors should the administrator consider? (Select two.)
Which default role has the most limited permission in the Integrated Cyber Defense Manager?
In the virus and Spyware Protection policy, an administrator sets the First action to Clean risk and sets If first action fails to Delete risk. Which two (2) factors should the administrator consider? (Select two.)
An administrator is troubleshooting a Symantec Endpoint Protection (SEP) replication.
Which component log should the administrator check to determine whether the communication between the two sites is working correctly?
Which type of communication is blocked, when isolating the endpoint by clicking on the isolate button in SEDR?
Which type of security threat continues to threaten endpoint security after a system reboot?
When a SEPM is enrolled in ICDm, which policy can only be managed from the cloud?
The Behavioral Heat Map indicates that a specific application and a specific behavior are never used together. What action can be safely set for the application behavior in a Behavioral Isolation policy?
What does the Endpoint Communication Channel (ECC) 2.0 allow Symantec EDR to directly connect to?
What Symantec Best Practice is recommended when setting up Active Directory integration with the Symantec Endpoint Protection Manager?
Which communication method is utilized within SES to achieve real-time management?
Which report template type should an administrator utilize to create a daily summary of network threats detected?
A Symantec Endpoint Protection (SEP) administrator receives multiple reports that machines are experiencing performance issues. The administrator discovers that the reports happen at about the same time as the scheduled LiveUpdate.
Which setting should the SEP administrator configure to minimize I/O when LiveUpdate occurs?
What does an end-user receive when an administrator utilizes the Invite User feature to distribute the SES client?
When a SEPM is enrolled in ICDm, which policy can only be managed from the cloud?
Which action can an administrator take to improve the Symantec Endpoint Protection Manager (SEPM) dashboard performance and report accuracy?
Which technology can prevent an unknown executable from being downloaded through a browser session?
What type of Threat Defense for Active Directory alarms are displayed after domain misconfigurations or hidden backdoors are detected?
Which Incident View widget shows the parent-child relationship of related security events?
Which Firewall rule components should an administrator configure to blockfacebook.comuse during business hours?
Which security control is complementary to IPS, providing a second layer of protection against network attacks?
Which two (2) instances could cause Symantec Endpoint Protection to be unable to remediate a file? (Select two.)
An Incident Responder has determined that an endpoint is compromised by a malicious threat. What SEDR feature would be utilized first to contain the threat?
Which two (2) criteria are used by Symantec Insight to evaluate binary executables? (Select two.)
Which option should an administrator utilize to temporarily or permanently block a file?
Which designation should an administrator assign to the computer configured to find unmanaged devices?
Which report template type should an administrator utilize to create a daily summary of network threats detected?
Which statement demonstrates how Symantec EDR hunts and detects IoCs in the environment?
What is the maximum number of endpoints a single SEDR Manager can support?
Which of the following is a benefit of choosing a hybrid SES Complete architecture?
The LiveUpdate Download Schedule is set to the default on the Symantec Endpoint Protection Manager (SEPM).
How many content revisions must the SEPM keep to ensure clients that check in to the SEPM every 10 days receive xdelta content packages instead of full content packages?
After several failed logon attempts, the Symantec Endpoint Protection Manager (SEPM) has locked the default admin account. An administrator needs to make system changes as soon as possible to address an outbreak, but the admin account is the only account.
Which action should the administrator take to correct the problem with minimal impact on the existing environment?
A file has been identified as malicious.
Which feature of SEDR allows an administrator to manually block a specific file hash?
Which rule types should be at the bottom of the list when an administrator adds device control rules?
A user is unknowingly about to connect to a malicious website and download a known threat within a .rar file. All Symantec Endpoint Protection technologies are installed on the client's system.
In which feature set order must the threat pass through to successfully infect the system?
Which protection technology can detect botnet command and control traffic generated on the Symantec Endpoint Protection client machine?
Which security control performs a cloud lookup on files downloaded during the Initial Access phase?
How would an administrator specify which remote consoles and servers have access to the management server?