Pass the Symantec Endpoint Security 250-580 Questions and answers with CertsForce

Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions
Questions # 21:

SES includes an advanced policy versioning system. When an administrator edits and saves the properties of an existing policy, a new version of the policy is created. What is the status of all previous versions of the policy?

Options:

A.

They are marked dormant until reactivated


B.

They are deleted after 30 days


C.

They are active and can be assigned


D.

They are added to the policy archive list


Expert Solution
Questions # 22:

Files are blocked by hash in the deny list policy. Which algorithm is supported, in addition to MD5?

Options:

A.

SHA2


B.

SHA256


C.

SHA256 "salted"


D.

MD5 "Salted"


Expert Solution
Questions # 23:

Which type of event does operation:1indicate in a SEDR database search?

Options:

A.

File Deleted.


B.

File Closed.


C.

File Open.


D.

File Created.


Expert Solution
Questions # 24:

Which Endpoint Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?

Options:

A.

Device Discovery


B.

Endpoint Enrollment


C.

Discover and Deploy


D.

Discover Endpoints


Expert Solution
Questions # 25:

An organization would like to use a content distribution method that centrally controls content types and versions. Almost all of their endpoints are running Windows.

What type of content distribution method should be used?

Options:

A.

Management Server


B.

Group Update Provider


C.

Internal LiveUpdate Server


D.

External LiveUpdate Server


Expert Solution
Questions # 26:

Which communication method is utilized within SES to achieve real-time management?

Options:

A.

Longpolling


B.

Standard polling


C.

Push Notification


D.

Heartbeat


Expert Solution
Questions # 27:

When can an administrator add a new replication partner?

Options:

A.

Immediately following the first LiveUpdate session of the new site


B.

During a Symantec Endpoint Protection Manager upgrade


C.

During the initial installation of the new site


D.

Immediately following a successful Active Directory sync


Expert Solution
Questions # 28:

If an administrator enables the setting to manage policies from the cloud, what steps must be taken to reverse this process?

Options:

A.

Navigate to ICDm > Enrollment and disable the setting


B.

Unenroll the SEPM > Disable the setting > Re-enroll the SEPM


C.

Revoke policies from ICDm


D.

Revoke policies from SEPM


Expert Solution
Questions # 29:

Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files results in a comparable number of false positives and false negatives."

Options:

A.

Level 6


B.

Level 5


C.

Level 2


D.

Level 1


Expert Solution
Questions # 30:

Where in the Attack Chain does Threat Defense for Active Directory provide protection?

Options:

A.

Attack Surface Reduction


B.

Attack Prevention


C.

Detection and Response


D.

Breach Prevention


Expert Solution
Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions