Multiple Choice
An organization created a rule in the Application and Device Control policy to block peer-to-peer applications. What two other protection technologies can block and log such unauthorized application? (Choose two.)
A) Memory Exploit Mitigation
B) Virus and Spyware Protection
C) Custom IPS Signatures
D) Host Integrity
E) Firewall
Correct Answer:

Verified
Correct Answer:
Verified
Q103: Where in the Symantec Endpoint Protection (SEP)
Q104: Which action does SONAR take before convicting
Q105: An administrator is reviewing an Infected Clients
Q106: What Symantec Endpoint Protection component facilitates distributing
Q107: Which content distribution method can distribute content
Q108: Which two criteria could be used to
Q109: What two steps should an administrator take
Q110: A Symantec Endpoint Protection (SEP) client uses
Q111: What does SONAR use to reduce false
Q113: An administrator changes the Virus and Spyware