Exam 1: Administration of Symantec Endpoint Protection 14 (Broadcom)
Exam 1: Administration of Symantec Endpoint Protection 14 (Broadcom)165 Questions
Exam 2: Administration of Symantec Email Security.cloud (v1)113 Questions
Exam 3: Administration of Symantec Data Loss Prevention 12 (Broadcom)98 Questions
Exam 4: Administration of Symantec ProxySG 6.7138 Questions
Exam 5: Symantec Messaging Gateway 10.5 Technical Assessment (Broadcom)409 Questions
Select questions type
Administrators at a company share a single terminal for configuring Symantec Endpoint Protection. The administrators want to ensure that each administrator using the console is forced to authenticate using their individual credentials. They are concerned that administrators may forget to log off the terminal, which would easily allow others to gain access to the Symantec Endpoint Protection Manager (SEPM) console. Which setting should the administrator disable to minimize the risk of non-authorized users logging into the SEPM console?
(Multiple Choice)
4.8/5
(38)
Where in the Symantec Endpoint Protection (SEP) management console will a SEP administrator find the option to allow all users to enable and disable the client firewall?
(Multiple Choice)
5.0/5
(34)
An administrator is troubleshooting a Symantec Endpoint Protection (SEP) replication. Which component log should the administrator check to determine whether the communication between the two sites is working correctly?
(Multiple Choice)
4.8/5
(40)
Which feature reduces the impact of Auto-Protect on a virtual client guest operating system?
(Multiple Choice)
4.7/5
(32)
A company has 10,000 Symantec Endpoint Protection (SEP) clients deployed using two Symantec Endpoint Protection Managers (SEPMs). Which configuration is recommended to ensure that each SEPM is able to effectively handle the communications load with the SEP clients?
(Multiple Choice)
4.8/5
(41)
A Symantec Endpoint Protection Manager (SEPM) administrator notices performance issues with the SEPM server. The Client tab becomes unresponsive in the SEPM console and .DAT files accumulate in the "agentinfo" folder. Which tool should the administrator use to gather log files to submit to Symantec Technical Support?
(Multiple Choice)
4.9/5
(45)
An administrator wants to make sure users are warned when they decide to download potentially malicious files. Which option should the administrator configure?
(Multiple Choice)
4.8/5
(36)
Which Symantec Endpoint Protection 12.1 protection technology provides the primary protection layers against zero-day network attacks?
(Multiple Choice)
4.7/5
(38)
A company is concerned that its clients may be out-of-date and it wants to ensure that all running applications are protected with Symantec's latest definitions, even if they are unavailable on the Symantec Endpoint Protection 12.1 (SEP) client. How could the company configure SEP to achieve this goal?
(Multiple Choice)
4.9/5
(31)
Refer to the exhibit.
Inheritance is turned on only for groups England, Sales, Laptops, and Manchester (highlighted). Without turning inheritance off, which top level group must be modified to affect users in the Laptop group?

(Multiple Choice)
4.7/5
(34)
Which setting can an administrator configure in the LiveUpdate Policy?
(Multiple Choice)
4.8/5
(38)
Which task is unavailable for administrative accounts that authenticate using RSA SecurID Authentication?
(Multiple Choice)
4.8/5
(34)
A user is unknowingly about to connect to a malicious website and download a known threat within a .rar file. All Symantec Endpoint Protection technologies are installed on the client's system. In which feature set order must the threat pass through to successfully infect the system?
(Multiple Choice)
4.9/5
(39)
An exception needs to be created for a file named "RunMe.exe" in a user's Windows 7 "My Documents" folder. The user's login name is Bob. Which method should be used?
(Multiple Choice)
4.9/5
(33)
A large software company has a small engineering department that is remotely located over a slow WAN connection. Which method will deploy the Symantec Endpoint Protection 12.1 (SEP) clients to the remote site using the smallest amount of network bandwidth?
(Multiple Choice)
4.7/5
(38)
In the virus and Spyware Protection policy, an administrator sets the First action to Clean risk and sets If first action fails to Delete risk. Which two factors should the administrator consider? (Select two.)
(Multiple Choice)
4.8/5
(40)
A Symantec Endpoint Protection 12.1 client is running a user-defined scan when a scheduled, administrator-defined scan is scheduled to launch. What is the effect on the client?
(Multiple Choice)
4.9/5
(29)
A company successfully deploys Symantec Endpoint Protection 12.1 to its clients. However, when the company deploys the client to the servers, the servers immediately reboot. The company needs to prevent the servers from rebooting during normal business hours. What is wrong?
(Multiple Choice)
4.8/5
(36)
What is a characteristic of a Symantec Endpoint Protection (SEP) domain?
(Multiple Choice)
4.8/5
(35)
Showing 101 - 120 of 165
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)