Symantec Endpoint Security Complete - R2 Technical Specialist 250-580 Question # 36 Topic 4 Discussion

Symantec Endpoint Security Complete - R2 Technical Specialist 250-580 Question # 36 Topic 4 Discussion

250-580 Exam Topic 4 Question 36 Discussion:
Question #: 36
Topic #: 4

An administrator needs to identify infected computers that require a restart to finish remediation of a threat. What steps in the SEPM should an administrator perform to identify and restart the systems?


A.

View the Computer Status log to determine if any computers require a restart. Run a command from the Risk log to restart computers.


B.

View the SONAR log to determine if any computers require a restart. Run a command from the Computer Status log to restart computers.


C.

View the Computer Status log to determine if any computers require a restart. Run a command from the SONAR log to restart computers.


D.

View the Computer Status log to determine if any computers require a restart. Run a command from the Attack log to restart computers.


Get Premium 250-580 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.