Pass the Symantec Symantec SCS Certification 250-561 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which Endpoint > Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?

Options:

A.

Discover Endpoints


B.

Endpoint Enrollment


C.

Discover and Deploy


D.

Device Discovery


Expert Solution
Questions # 12:

An administrator suspects that several computers have become part of a botnet. What should the administrator do to detect botnet activity on the network?

Options:

A.

Enable the Command and Control Server Firewall


B.

Add botnet related signatures to the IPS policy's Audit Signatures list


C.

Enable the IPS policy's Show notification on the device setting


D.

Set the Antimalware policy's Monitoring Level to 4


Expert Solution
Questions # 13:

Which policy should an administrator edit to utilize the Symantec LiveUpdate server for pre-release content?

Options:

A.

The Firewall Policy


B.

The System Schedule Policy


C.

The System Policy


D.

The LiveUpdate Policy


Expert Solution
Questions # 14:

Which SES advanced feature detects malware by consulting a training model composed of known good and known bad fries?

Options:

A.

Signatures


B.

Advanced Machine Learning


C.

Reputation


D.

Artificial Intelligence


Expert Solution
Questions # 15:

Which default role has the most limited permission in the Integrated Cyber Defense Manager?

Options:

A.

Restricted Administrator


B.

Limited Administrator


C.

Server Administrator


D.

Endpoint Console Domain Administrator


Expert Solution
Questions # 16:

What does SES's advanced search feature provide when an administrator searches for a specific term?

Options:

A.

A search modifier dialog


B.

A search wizard dialog


C.

A suggested terms dialog


D.

A search summary dialog


Expert Solution
Questions # 17:

Which Firewall Stealth setting prevents OS fingerprinting by sending erroneous OS information back to the attacker?

Options:

A.

Disable OS fingerprint profiling


B.

Disable OS fingerprint detection


C.

Enable OS fingerprint masqueradi


D.

Enable OS fingerprint protection


Expert Solution
Questions # 18:

Which SES feature helps administrator apply policies based on specific endpoint profiles?

Options:

A.

Device Groups


B.

Device Profiles


C.

Policy Bundles


D.

Policy Groups


Expert Solution
Questions # 19:

Which Antimalware technology is used after all local resources have been exhausted?

Options:

A.

Sapient


B.

ITCS


C.

Emulator


D.

Reputation


Expert Solution
Questions # 20:

Which Anti-malware technology should an administrator utilize to expose the malicious nature of a file created with a custom packet?

Options:

A.

Sandbox


B.

SONAR


C.

Reputation


D.

Emulator


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions