Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Certification
Study Set
Symantec
Exam 2: Administration of Symantec Email Security.cloud (v1)
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 61
Multiple Choice
What steps should an administrator take to utilize Symantec Endpoint Protection in a non-persistent virtual desktop infrastructure?
Question 62
Multiple Choice
A Symantec Endpoint Protection (SEP) administrator creates a firewall policy to block FTP traffic and assigns the policy to all of the SEP clients. The network monitoring team informs the administrator that a client system is making an FTP connection to a server. While investigating the problem from the SEP client GUI, the administrator notices that there are zero entries pertaining to FTP traffic in the SET Traffic log or Packet log. While viewing the Network Activity dialog, there is zero inbound/outbound traffic for the FTP process. What is the most likely reason?
Question 63
Multiple Choice
Which task should an administrator perform to troubleshoot operation of the Symantec Endpoint Protection embedded database?
Question 64
Multiple Choice
A Symantec Endpoint Protection (SEP) administrator performed a disaster recovery without a database backup. In which file should the SEP administrator add "scm.agent.groupcreation=true" to enable the automatic creation of client groups?
Question 65
Multiple Choice
Why is Notepad unable to save the changes to the file in the image below?
Question 66
Multiple Choice
An organization needs to add a collection of DNS host names to permit in the firewall policy. How should the SEP Administrator add these DNS host names as a single rule in the firewall policy?
Question 67
Multiple Choice
Which policy should an administrator modify to enable Virtual Image Exception (VIE) functionality?
Question 68
Multiple Choice
An administrator is troubleshooting a Symantec Endpoint Protection (SEP) replication. Which component log should the administrator check to determine whether the communication between the two sites is working correctly?
Question 69
Multiple Choice
An administrator selects the Backup files before attempting to repair the Remediations option in the Auto-Protect policies. Which two actions occur when a virus is detected? (Select two.)
Question 70
Multiple Choice
A Symantec Endpoint Protection administrator must block traffic from an attacking computer for a specific time period. Where should the administrator adjust the time to block the attacking computer?