Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

250-428 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

250-428 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Administration of Symantec Endpoint Protection 14
  • Last Update: May 5, 2024
  • Questions and Answers: 135
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

250-428 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

250-428 Practice Exam Questions with Answers Administration of Symantec Endpoint Protection 14 Certification

Question # 6

Which two criteria can an administrator use to determine hosts in a host group? (Select two.)

A.

Network Adapters

B.

Network Services

C.

Subnet

D.

Application Protocol

E.

DNS Domain

Full Access
Question # 7

Catastrophic hardware failure has occurred on a single Symantec Endpoint Protection Manager (SEPM) in an environment with two SEPMs.

What is the quickest way an administrator can restore the environment to its original state?

A.

Install a new SEPM into the existing site

B.

Reinstall the entire SEPM environment

C.

Clone the still functioning SEPM and change the server.properties file

D.

Build a new site and configure replication with the still functioning SEPM

Full Access
Question # 8

Which two options are supported Symantec Endpoint Manager authentication types? (Select two.)

A.

Network Access Control

B.

Biometrics

C.

RSA SecurID

D.

MS-CHAP

E.

Microsoft Active Directory

Full Access
Question # 9

Which command attempts to find the name of the drive in the private region and to match it to a disk media record that is missing a disk access record?

A.

vxdisk

B.

vxdctl

C.

vxreattach

D.

vxrecover

Full Access
Question # 10

A large-scale virus attack is occurring and a notification condition is configured to send an email whenever viruses infect five computers on the network. A Symantec Endpoint Protection administrator has set a one hour damper period for that notification condition.

How many notifications does the administrator receive after 30 computers are infected in two hours?

A.

1

B.

2

C.

6

D.

15

Full Access
Question # 11

Which action must a Symantec Endpoint Protection administrator take before creating custom Intrusion Prevention signatures?

A.

Define signature variables

B.

Enable signature logging

C.

Change the custom signature order

D.

Create a Custom Intrusion Prevention Signature library

Full Access
Question # 12

An administrator is designing a new single site Symantec Endpoint Protection environment. Due to perimeter firewall bandwidth restrictions, the design needs to minimize the amount of traffic from content passing through the firewall.

Which source must the administrator avoid using?

A.

Group Update Provider (GUP)

B.

LiveUpdate Administrator (LUA)

C.

Symantec Endpoint Protection Manager

D.

Shared Insight Cache (SIC)

Full Access
Question # 13

A Symantec Endpoint Protection administrator is using System Lockdown in blacklist mode with a file fingerprint list. When testing a client, the administrator notices that at least one of the files on the list is allowed to execute.

What is the likely cause of the problem?

A.

The application has been upgraded.

B.

The Application and Device Control policy is in test mode.

C.

A file exception has been added to the Exceptions policy.

D.

The Application and Device Control policy is allowing the file to execute.

Full Access
Question # 14

What optional Symantec Endpoint Protection component could an administrator utilize if an organization requires custom reports and queries?

A.

Q-Radar

B.

Splunk

C.

Crystal Reports

D.

IT Analytics

Full Access
Question # 15

A Symantec Endpoint Protection (SEP) administrator creates a firewall policy to block FTP traffic and assigns the policy to all of the SEP clients. The network monitoring team informs the administrator that a client system is making an FTP connection to a server. While investigating the problem from the SEP client GUI, the administrator notices that there are zero entries pertaining to FTP traffic in the SET Traffic log or Packet log. While viewing the Network Activity dialog, there is zero inbound/outbound traffic for the FTP process.

What is the most likely reason?

A.

The server is in the IPS policy excluded hosts list.

B.

The block rule is below the blue line.

C.

Peer-to-peer authentication is allowing the traffic.

D.

The server has an IPS exception for that traffic.

Full Access
Question # 16

An administrator notices that some entries list that the Risk was partially removed. The administrator needs to determine whether additional steps are necessary to remediate the threat.

Where in the Symantec Endpoint Protection Manager console can the administrator find additional information on the risk?

A.

Infected and At Risk Computers report

B.

Risk log

C.

Notifications

D.

Computer Status report

Full Access
Question # 17

An administrator is troubleshooting a Symantec Endpoint Protection (SEP) replication.

Which component log should the administrator check to determine whether the communication between the two sites is working correctly?

A.

Tomcat

B.

Apache Web Server

C.

Group Update Provider (GUP)

D.

SQL Server

Full Access
Question # 18

When can an administrator add a new replication partner?

A.

immediately following the first LiveUpdate session of the new site

B.

during a Symantec Endpoint Protection Manager upgrade

C.

during the initial install of the new site

D.

immediately following a successful Active Directory sync

Full Access
Question # 19

A company deploys Symantec Endpoint Protection (SEP) to50 virtual machines running on a single ESXi host.

Which configuration change can the administrator make to minimize sudden IOPS impact on the ESXi server while each SEP endpoint communicates with the Symantec Endpoint Protection Manager?

A.

Reduce number of content revisions to keep

B.

Increase download randomization window

C.

Reduce the heartbeat interval

D.

Increase Download Insight sensitivity level

Full Access
Question # 20

Which two options are available when configuring DNS change detections for SONAR? (Select two.)

A.

Log

B.

Quarantine

C.

Block

D.

Active Response

E.

Trace

Full Access