Pass the Symantec Endpoint Security 250-580 Questions and answers with CertsForce

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

What should an administrator utilize to identify devices on a Mac?

Options:

A.

UseDevViewerwhen the Device is connected.


B.

Use Devicelnfo when the Device is connected.


C.

UseDevice Managerwhen the Device is connected.


D.

UseGatherSymantecInfowhen the Device is connected.


Questions # 2:

Which SES feature helps to ensure that devices are compliant with a company's security standards?

Options:

A.

Host Integrity


B.

Intensive Protection


C.

Trusted Updater


D.

Adaptive Protection


Questions # 3:

Why is it important for an Incident Responder to review Related Incidents and Events when analyzing an incident for an After Actions Report?

Options:

A.

It ensures that the Incident is resolved, and the threat does not continue to spread to other parts of the environment.


B.

It ensures that the Incident is resolved, and future threats are automatically remediated.


C.

It ensures that the Incident is resolved, and the responder is able to close the incident in the SEDR manager.


D.

It ensures that the Incident is resolved, and the responder can determine the best remediation method.


Questions # 4:

An administrator needs to increase the access speed for client files that are stored on a file server. Which configuration should the administrator review to address the read speed from the server?

Options:

A.

Enable Network Cache in the client's Virus and Spyware Protection policy


B.

Add the applicable server to a trusted host group


C.

Create a Firewall allow rule for the server's IP address.


D.

Enable download randomization in the client group's communication settings


Questions # 5:

What is the function of Symantec Insight?

Options:

A.

Provides reputation ratings for structured data


B.

Enhances the capability of Group Update Providers (GUP)


C.

Increases the efficiency and effectiveness of LiveUpdate


D.

Provides reputation ratings for binary executables


Questions # 6:

How should an administrator set up an alert to be notified when manual remediation is needed on an endpoint?

Options:

A.

Add a Single Risk Event notification and specify "Left Alone" for the action taken. Choose to log the notification and send an e-mail to the system administrators.


B.

Add a Client security alert notification and specify "Left Alone" for the action taken. Choose to log the notification and send an e-mail to the system administrators.


C.

Add a System event notification and specify "Left Alone" for the action taken. Choose to log the notification and send an e-mail to the system administrators.


D.

Add a New risk detected notification and specify "Left Alone" for the action taken. Choose to log the notification and send an emailto the system administrators.


Questions # 7:

What type of Threat Defense for Active Directory alarms are displayed after domain misconfigurations or hidden backdoors are detected?

Options:

A.

Computer Information Gathering


B.

Pass-The-Ticket


C.

Credential Theft


D.

Dark Corners


Questions # 8:

The LiveUpdate Download Schedule is set to the default on the Symantec Endpoint Protection Manager (SEPM).

How many content revisions must the SEPM keep to ensure clients that check in to the SEPM every 10 days receive xdelta content packages instead of full content packages?

Options:

A.

10


B.

20


C.

30


D.

60


Questions # 9:

What type of policy provides a second layer of defense, after the Symantec firewall?

Options:

A.

Virus and Spyware


B.

Host Integrity


C.

Intrusion Prevention


D.

System Lockdown


Questions # 10:

A company allows users to create firewall rules. During the course of business, users are accidentally adding rules that block a custom internal application.

Which steps should the Symantec Endpoint Protection administrator take to prevent users from blocking the custom application?

Options:

A.

Create an Allow Firewall rule for the application and place it at the bottom of the firewall rules below the blue line


B.

Create an Allow Firewall rule for the application and place it at the bottom of the firewall rules above the blue line


C.

Create an Allow All Firewall rule for the fingerprint of the file and place it at the bottom of the firewall rules above the blue line


D.

Create an Allow for the network adapter type used by the application and place it at the top of the firewall rules below the blue line


Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions