Pass the Symantec Endpoint Protection 14 250-428 Questions and answers with CertsForce

Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions
Questions # 21:

A Symantec Endpoint Protection administrator must block traffic from an attacking computer for a specific time period.

Where should the administrator adjust the time to block the attacking computer?

Options:

A.

In the group policy, under External Communication settings


B.

In the group policy, under Communication settings


C.

In the firewall policy, under Protection and Stealth


D.

In the firewall policy, under Built in Rules


Expert Solution
Questions # 22:

An organization recently experienced an outbreak and is conducting a health check of their environment! What Protection Technology should the SEP team enable to prevent vulnerability attacks on software?

Options:

A.

Memory Exploit Mitigation (MEM)


B.

System Lockdown


C.

Behavior Monitoring (SONAR)


D.

Host Integrity


Expert Solution
Questions # 23:

Which action does the Shared Insight Cache (SIC) server take when the whitelist reaches maximum capacity?

Options:

A.

The SIC server allocates additional memory for the whitelist as needed.


B.

The SIC server will start writing the cache to disk.


C.

The SIC server will remove the least recently used items based on the prune size.


D.

The SIC server will remove items with the fewest number of votes.


Expert Solution
Questions # 24:

What is a valid Symantec Endpoint Protection (SEP) single site design?

Options:

A.

Multiple MySQL databases


B.

One Microsoft SQL Server database


C.

One Microsoft SQL Express database


D.

Multiple embedded databases


Expert Solution
Questions # 25:

What is a function of Symantec Insight?

Options:

A.

Provides reputation ratings for binary executables


B.

Enhances the capability of Group Update Providers (GUP)


C.

Provides reputation ratings for structured data


D.

Increases the efficiency and effectiveness of LiveUpdate


Expert Solution
Questions # 26:

Which step is unnecessary when an administrator creates an application rule set?

Options:

A.

define a provider


B.

select a process to apply


C.

select a process to exclude


D.

define rule order


Expert Solution
Questions # 27:

A user is unknowingly about to connect to a malicious website and download a known threat within a .rar file. All Symantec Endpoint Protection technologies are installed on the client's system.

In which feature set order must the threat pass through to successfully infect the system?

Options:

A.

Download Insight, Firewall, IPS


B.

Firewall, IPS, Download Insight


C.

IPS, Firewall, Download Insight


D.

Download Insight, IPS, Firewall


Expert Solution
Questions # 28:

Which task is unavailable for administrative accounts that authenticate using RSA SecurID Authentication?

Options:

A.

reset forgotten passwords


B.

import organizational units (OU) from Active Directory


C.

configure external logging


D.

enable Session Based Authentication with Web Services


Expert Solution
Questions # 29:

Which two criteria can an administrator use to determine hosts in a host group? (Select two.)

Options:

A.

Network Adapters


B.

Network Services


C.

Subnet


D.

Application Protocol


E.

DNS Domain


Expert Solution
Questions # 30:

Why is Notepad unable to save the changes to the file in the image below?

Question # 30

Options:

A.

SONAR High Risk detection is set to Block


B.

SONAR is set to block host file modifications.


C.

Tamper Protection is preventing Notepad from modifying the host file.


D.

System Lockdown is enabled.


Expert Solution
Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions