Pass the Symantec Symantec SCS Certification 250-561 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

The ICDm has generated a blacklist task due to malicious traffic detection. Which SES component was utilized to make that detection?

Options:

A.

Antimalware


B.

Reputation


C.

Firewall


D.

IPS


Questions # 2:

Which dashboard should an administrator access to view the current health of the environment?

Options:

A.

The Antimalware Dashboard


B.

The SES Dashboard


C.

The Device Integrity Dashboard


D.

The Security Control Dashboard


Questions # 3:

Which two (2) skill areas are critical to the success of incident Response Teams (Select two)

Options:

A.

Project Management


B.

Incident Management


C.

Cyber Intelligence


D.

Incident Response


E.

Threat Analysis


Questions # 4:

What version number is assigned to a duplicated policy?

Options:

A.

One


B.

Zero


C.

The original policy's number plus one


D.

The original policy's version numb


Questions # 5:

Which Symantec component is required to enable two factor authentication with VIP on the Integrated Cyber Defense manager (ICDm)?

Options:

A.

A physical token or a software token


B.

A software token and a VIP server


C.

A software token and an active directory account


D.

A physical token or a secure USB key


Questions # 6:

Which two (2) Discovery and Deploy features could an administrator use to enroll MAC endpoints? (Select two)

Options:

A.

Push Enroll


B.

A custom Installation package creator pact


C.

A default Direct Installation package


D.

Invite User


E.

A custom Direct installation package


Questions # 7:

Which communication method is utilized within SES to achieve real-time management?

Options:

A.

Heartbeat


B.

Standard polling


C.

Push Notification


D.

Long polling


Questions # 8:

Wh.ch Firewall rule components should an administrator configure to block facebook.com use during business hours?

Options:

A.

Action, Hosts(s), and Schedule


B.

Action, Application, and Schedule


C.

Host(s), Network Interface, and Network Service


D.

Application, Host(s), and Network Service


Questions # 9:

Which two (2) steps should an administrator take to guard against re-occurring threats? (Select two)

Options:

A.

Confirm that daily active and weekly full scans take place on all endpoints


B.

Verify that all endpoints receive scheduled Live-Update content


C.

Use Power Eraser to clean endpoint Windows registries


D.

Add endpoints to a high security group and assign a restrictive Antimalware policy to the group


E.

Quarantine affected endpoints


Questions # 10:

In the ICDm, administrators are assisted by the My Task view. Which automation type creates the tasks within the console?

Options:

A.

Artificial Intelligence


B.

Machine Learning


C.

Advanced Machine Learning


D.

Administrator defined rules


Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions