Exam 2: Administration of Symantec Email Security.cloud (v1)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A system running Symantec Protection is assigned to a group with client user interface control settings set to mixed mode with Auto-Protect options set to Client. The user on the system is unable to turn off Auto-Protect. What is likely cause of this problem?

(Multiple Choice)
4.9/5
(45)

When can an administrator add a new replication partner?

(Multiple Choice)
4.8/5
(30)

An organization is troubleshooting a SONAR false positive and has created an exclusion for the in-house application generating the detection. How can the organization use Process Explorer to verify that the exclusion works?

(Multiple Choice)
4.8/5
(37)

What is a function of Symantec Insight?

(Multiple Choice)
4.9/5
(41)

A Symantec Endpoint Protection Manager (SEPM) administrator notices performance issues with the SEPM server. The Client tab becomes unresponsive in the SEPM console and .DAT files accumulate in the "agentinfo" folder. Which tool should the administrator use to gather log files to submit to Symantec Technical Support?

(Multiple Choice)
4.8/5
(37)

Why does Power Eraser need Internet access?

(Multiple Choice)
4.7/5
(31)

A company has a small number of systems in their Symantec Endpoint Protection Manager (SEPM) group with federal mandates that AntiVirus definitions undergo a two week testing period. After being loaded on the client, the tested virus definitions must remain unchanged on the client systems until the next set of virus definitions have completed testing. All other clients must remain operational on the most recent definition sets. An internal LiveUpdate Server has been considered as too expensive to be a solution for this company. What should be modified on the SEPM to meet this mandate?

(Multiple Choice)
5.0/5
(44)

What type of client remediation can an administrator perform in the SEPM with events in the Attack logs?

(Multiple Choice)
4.8/5
(42)

Which option is a function of the Symantec Endpoint Protection client?

(Multiple Choice)
4.9/5
(38)

A company has an application that requires network traffic in both directions to multiple systems at a specific external domain. A firewall rule was created to allow traffic to and from the external domain, but the rule is blocking incoming traffic. What should an administrator enable in the firewall policy to allow this traffic?

(Multiple Choice)
4.8/5
(36)

Which option is a characteristic of a Symantec Endpoint Protection (SEP) domain?

(Multiple Choice)
4.7/5
(44)

Which two options are available when configuring DNS change detections for SONAR? (Select two.)

(Multiple Choice)
4.8/5
(35)

What type of exceptions could an administrator create from the Symantec Endpoint Protection Manager for a Linux client? (Choose two.)

(Multiple Choice)
4.8/5
(34)

Which two criteria can an administrator use to determine hosts in a host group? (Select two.)

(Multiple Choice)
5.0/5
(41)

An administrator is re-adding an existing Replication Partner to the local Symantec Endpoint Protection Manager site. Which two parameters are required to re-establish this replication partnership? (Select two.)

(Multiple Choice)
4.7/5
(31)

An administrator is using the SylinkDrop tool to update a Symantec Endpoint Protection client install on a system. The client fails to migrate to the new Symantec Endpoint Protection Manager (SEPM), which is defined correctly in the Sylink.xml file that was exported from the SEPM. Which settings must be provided with SylinkDrop to ensure the successful migration to a new Symantec Endpoint Protection environment with additional Group Level Security Settings?

(Multiple Choice)
4.8/5
(39)

Which action must a Symantec Endpoint Protection administrator take before creating custom Intrusion Prevention signatures?

(Multiple Choice)
4.8/5
(40)

Where could a SEP Administrator specify a notice to display before logging onto the Symantec Endpoint Protection Manager?

(Multiple Choice)
4.9/5
(42)

A company allows users to create firewall rules. During the course of business, users are accidentally adding rules that block a custom internal application. Which steps should the Symantec Endpoint Protection administrator take to prevent users from blocking the custom application?

(Multiple Choice)
4.9/5
(38)

An administrator is designing a new single site Symantec Endpoint Protection environment. Due to perimeter firewall bandwidth restrictions, the design needs to minimize the amount of traffic from content passing through the firewall. Which source must the administrator avoid using?

(Multiple Choice)
4.9/5
(40)
Showing 81 - 100 of 113
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)