Exam 2: Administration of Symantec Email Security.cloud (v1)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In the virus and Spyware Protection policy, an administrator sets the First action to Clean risk and sets If first action fails to Delete risk? Which two factors should the administrator consider? (Select two.)

(Multiple Choice)
4.9/5
(37)

An administrator needs to increase the access speed for client files that are stored on a file server. Which configuration should the administrator review to address the read speed from the server?

(Multiple Choice)
4.8/5
(36)

Which two are policy types within the Symantec Endpoint Protection Manager? (Select two.)

(Multiple Choice)
4.8/5
(36)

Which two criteria are used by Symantec Insight to evaluate binary executables? (Select two.)

(Multiple Choice)
4.9/5
(37)

The LiveUpdate Download Schedule is set to the default on the Symantec Endpoint Protection Manager (SEPM). How many content revisions must the SEPM keep to ensure clients that check in to the SEPM every 10 days receive delta content packages instead of full content packages?

(Multiple Choice)
4.9/5
(40)

An organization is considering multiple sites for their Symantec Endpoint Protection environment. What are two reasons that the organization should consider? (Choose two.)

(Multiple Choice)
4.9/5
(40)

Which is an example of legitimate software that Intrusion Protection Systems (IPS) may detect as a threat?

(Multiple Choice)
4.8/5
(46)

Administrators at a company share a single terminal for configuring Symantec Endpoint Protection. The administrators want to ensure that each administrator using the console is forced to authenticate using their individual credentials. They are concerned that administrators may forget the log off the terminal, which would easily allow the others to gain access to the Symantec Endpoint Protection Manager (SEPM) console. Which setting should the administrator disable to minimize the risk of non-authorized users logging into the SEPM console?

(Multiple Choice)
4.8/5
(38)

An organization has a small group of servers with large drive volumes. What setting in the Virus and Spyware Protection policy can the organization utilize when scheduling scans on these servers?

(Multiple Choice)
4.8/5
(29)

A Symantec Endpoint Protection (SEP) administrator receives multiple reports that machines are experiencing performance issues. The administrator discovers that the reports happen about the same time as the scheduled LiveUpdate. Which setting should the SEP administrator configure to minimize I/O when LiveUpdate occurs?

(Multiple Choice)
4.8/5
(37)

An administrator configures the scan duration for a scheduled scan. The scan fails to complete in the specified time period. When will the next scheduled scan occur on the computer?

(Multiple Choice)
4.8/5
(45)

An administrator needs to add an Application Exception. When the administrator accesses the Application Exception dialog window, applications fail to appear. What is the likely problem?

(Multiple Choice)
5.0/5
(33)

An administrator reports that the Home, Monitors, and Report pages are absent in the Symantec Endpoint Protection Management console when the administrator logs on. Which action should the administrator perform to correct the problem?

(Multiple Choice)
4.9/5
(40)

An organization recently experienced an outbreak involving a threat that replicated over network shares. The SEP Administrator needs to heuristically scan file operations that target network drives. What options should an administrator enable in the Virus and Spyware Protection policy?

(Multiple Choice)
4.9/5
(36)

Which setting can an administrator configure in the LiveUpdate policy?

(Multiple Choice)
4.9/5
(32)

How are Insight results stored?

(Multiple Choice)
4.7/5
(49)

The security status on the console home page is failing to alert a Symantec Endpoint Protection (SEP) administrator when virus definitions are out of date. How should the SEP administrator enable the Security Status alert?

(Multiple Choice)
4.9/5
(45)

Which action does the Shared Insight Cache (SIC) server take when the whitelist reaches maximum capacity?

(Multiple Choice)
4.9/5
(34)

Which Symantec Endpoint Protection technology blocks a downloaded program from installing browser plugins?

(Multiple Choice)
4.7/5
(33)

An organization identified a threat in their environment and needs to limit the spread of the threat. How should the SEP Administrator block the threat using Application and Device Control?

(Multiple Choice)
4.8/5
(41)
Showing 41 - 60 of 113
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)