Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

250-428 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

250-428 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Administration of Symantec Endpoint Protection 14
  • Last Update: Sep 12, 2025
  • Questions and Answers: 135
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

250-428 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

250-428 Practice Exam Questions with Answers Administration of Symantec Endpoint Protection 14 Certification

Question # 6

Catastrophic hardware failure has occurred on a single Symantec Endpoint Protection Manager (SEPM) in an environment with two SEPMs.

What is the quickest way an administrator can restore the environment to its original state?

A.

Install a new SEPM into the existing site

B.

Reinstall the entire SEPM environment

C.

Clone the still functioning SEPM and change the server.properties file

D.

Build a new site and configure replication with the still functioning SEPM

Full Access
Question # 7

Which tool should an administrator use to discover and deploy the Symantec Endpoint Protection client to new computers?

A.

Unmanaged Detector

B.

Client Deployment Wizard

C.

Communication Update Package Deployment

D.

Symantec Endpoint Discovery Tool

Full Access
Question # 8

A company has an application that requires network traffic in both directions to multiple systems at a specific external domain. A firewall rule was created to allow traffic to and from the external domain, but the rule is blocking incoming traffic.

What should an administrator enable in the firewall policy to allow this traffic?

A.

TCP resequencing

B.

Smart DHCP

C.

Reverse DNS Lookup

D.

Smart WINS

Full Access
Question # 9

An organization recently experienced an outbreak and is conducting a health check of their environment! What Protection Technology should the SEP team enable to prevent vulnerability attacks on software?

A.

Memory Exploit Mitigation (MEM)

B.

System Lockdown

C.

Behavior Monitoring (SONAR)

D.

Host Integrity

Full Access
Question # 10

An administrator uses the search criteria displayed in the image below.

250-428 question answer

Which results are returned from the query?

A.

Only VMware Servers in the Default Group

B.

All Windows 2012 Servers in the Default Group

C.

Only Windows 2012 Servers that are Virtualized in the Default Group

D.

All Windows 2012 Servers and all Virtualized Servers in the Default Group

Full Access
Question # 11

A company deploys Symantec Endpoint Protection (SEP) to50 virtual machines running on a single ESXi host.

Which configuration change can the administrator make to minimize sudden IOPS impact on the ESXi server while each SEP endpoint communicates with the Symantec Endpoint Protection Manager?

A.

Reduce number of content revisions to keep

B.

Increase download randomization window

C.

Reduce the heartbeat interval

D.

Increase Download Insight sensitivity level

Full Access
Question # 12

Which action must a Symantec Endpoint Protection administrator take before creating custom Intrusion Prevention signatures?

A.

Define signature variables

B.

Enable signature logging

C.

Change the custom signature order

D.

Create a Custom Intrusion Prevention Signature library

Full Access
Question # 13

A Symantec Endpoint Protection (SEP) administrator creates a firewall policy to block FTP traffic and assigns the policy to all of the SEP clients. The network monitoring team informs the administrator that a client system is making an FTP connection to a server. While investigating the problem from the SEP client GUI, the administrator notices that there are zero entries pertaining to FTP traffic in the SET Traffic log or Packet log. While viewing the Network Activity dialog, there is zero inbound/outbound traffic for the FTP process.

What is the most likely reason?

A.

The server is in the IPS policy excluded hosts list.

B.

The block rule is below the blue line.

C.

Peer-to-peer authentication is allowing the traffic.

D.

The server has an IPS exception for that traffic.

Full Access
Question # 14

Which task is unavailable for administrative accounts that authenticate using RSA SecurID Authentication?

A.

reset forgotten passwords

B.

import organizational units (OU) from Active Directory

C.

configure external logging

D.

enable Session Based Authentication with Web Services

Full Access
Question # 15

A Symantec Endpoint Protection Manager (SEPM) administrator notices performance issues with the SEPM server. The Client tab becomes unresponsive in the SEPM console and .DAT files accumulate in the “agentinfo” folder.

Which tool should the administrator use to gather log files to submit to Symantec Technical Support?

A.

collectLog.cmd

B.

LogExport.exe

C.

smc.exe

D.

ExportLog.vbs

Full Access
Question # 16

In the virus and Spyware Protection policy, an administrator sets the First action to Clean risk and sets If first action fails to Delete risk.

Which two factors should the administrator consider? (Select two.)

A.

The deleted file may still be in the Recycle Bin.

B.

IT Analytics may keep a copy of the file for investigation.

C.

False positives may delete legitimate files.

D.

Insight may back up the file before sending it to Symantec.

E.

A copy of the threat may still be in the quarantine.

Full Access
Question # 17

What is a valid Symantec Endpoint Protection (SEP) single site design?

A.

Multiple MySQL databases

B.

One Microsoft SQL Server database

C.

One Microsoft SQL Express database

D.

Multiple embedded databases

Full Access
Question # 18

In addition to performance improvements, which two benefits does Insight provide? (Select two.)

A.

Reputation scoring for documents

B.

Zero-day threat detection

C.

Protection against malicious java scripts

D.

False positive mitigation

E.

Blocking of malicious websites

Full Access
Question # 19

Where can an administrator obtain the Sylink.xml file?

A.

C:\Program Files\Symantec\Symantec Endpoint Protection\ folder on the client

B.

C:\Program Files\Symantec\Symantec Endpoint Protection\Manager\data\inbox\agent\ folder on the Symantec Endpoint Protection Manager

C.

by selecting the client group and exporting the communication settings in the Symantec Endpoint Protection Manager Console

D.

by selecting the location and exporting the communication settings in the Symantec Endpoint Protection Manager Console

Full Access
Question # 20

Which package type should an administrator use to reduce a SEP environment’s footprint when considering that new SEP 14 clients will be installed on point of sale terminals?

A.

Default Standard Client

B.

Default Embedded or VDI client

C.

Default dark network client

D.

Custom Standard client

Full Access
Question # 21

Which setting can an administrator change that will result in the greatest impact on the speed of delivery of Symantec Endpoint Protection policy changes to the endpoints?

A.

Download randomization

B.

Heartbeat interval

C.

LiveUpdate scheduling frequency

D.

Reconnection preferences

Full Access
Question # 22

Which two options are supported Symantec Endpoint Manager authentication types? (Select two.)

A.

Network Access Control

B.

Biometrics

C.

RSA SecurID

D.

MS-CHAP

E.

Microsoft Active Directory

Full Access
Question # 23

A system running Symantec Endpoint Protection is assigned to a group with client user interface control settings set to mixed mode with Auto-Protect options set to Client. The user on the system is unable to turn off Auto-Protect.

What is the likely cause of this problem?

A.

Tamper protection is enabled.

B.

System Lockdown is enabled.

C.

Application and Device Control is configured.

D.

The padlock on the enable Auto-Protect option is locked.

Full Access
Question # 24

A Symantec Endpoint Protection (SEP) administrator performed a disaster recovery without a database backup.

In which file should the SEP administrator add “scm.agent.groupcreation=true” to enable the automatic creation of client groups?

A.

conf.properties

B.

httpd.conf

C.

settings.conf

D.

catalina.out

Full Access
Question # 25

Which two criteria can an administrator use to determine hosts in a host group? (Select two.)

A.

Network Adapters

B.

Network Services

C.

Subnet

D.

Application Protocol

E.

DNS Domain

Full Access
Question # 26

An organization has several remote location with minimum bandwidth and would like to use a content distribution method that does NOT involve configuring as internal LiveUpdate server.

What content distribution method should be utilized?

A.

External LiveUpdate

B.

Management Server

C.

Intelligent Updater

D.

Group Update Provider

Full Access
Question # 27

How are Insight results stored?

A.

Encrypted on the Symantec Endpoint Protection Client

B.

Unencrypted on the Symantec Endpoint Protection Manager

C.

Encrypted on the Symantec Endpoint Protection Manager

D.

Unencrypted on the Symantec Endpoint Protection Client

Full Access
Question # 28

You have executed the vxdg -g diskgroup adddisk disk_name= command.

Which switch needs to be added to force VxVM to take the disk media name of the failed disk and assign it to the new replacement disk?

A.

-force

B.

-k

C.

-f

D.

-assign

Full Access
Question # 29

Which object in the Symantec Endpoint Protection Manager console describes the most granular level to which a policy can be assigned?

A.

Group

B.

Computer

C.

User

D.

Client

Full Access
Question # 30

An organization is troubleshooting a false positive detection with WS.Respulation.1 Signature on an unmanaged SEP client.

What are the steps to create an exclusion on the unmanaged SEP Client?

A.

In the Symantec Endpoint Protection Client, click on View logs and select Virus And SEP ware Protection -> View Logs> Open the Risk Log and Select the log entry for the false positive. Click Export.

B.

In the Symantec Endpoint Protection Client, client on Change Settings and select Exceptions -> Configure Settings. Choose Add and select SONAR Exception.

C.

In the Symantec Endpoint Protection Client, client on Change Settings and selects Exceptions -> Configure Settings. Choose Add and select Security Exception.

D.

In the Symantec Endpoint Protection Client, client on Change Settings and select Exceptions -> Configure Settings. Choose Add and select Application Exception.

Full Access
Question # 31

Which Symantec Endpoint Protection component enables access to data through ad-hoc reports and charts with pivot tables?

A.

Symantec Protection Center

B.

Shared Insight Cache Server

C.

Symantec Endpoint Protection Manager

D.

IT Analytics

Full Access
Question # 32

A large software company runs a small engineering department that is remotely located over a slow WAN connection.

Which option should the company use to install an exported Symantec Endpoint Protection (SEP) package to the remote site using the smallest amount of network bandwidth?

A.

a SEP package using Basic content

B.

a SEP package using a policy defined Single Group Update Provider (GUP)

C.

a SEP package using a policy defined Multiple Group Update Provider (GUP) list

D.

a SEP package using the Install Packages tab

Full Access
Question # 33

An administrator is re-adding an existing Replication Partner to the local Symantec Endpoint Protection Manager site.

Which two parameters are required to re-establish this replication partnership? (Select two.)

A.

Remote site Encryption Password

B.

Remote server IP Address and port

C.

Remote SQL database account credentials

D.

Remote server Administrator credentials

E.

Remote site Domain ID

Full Access
Question # 34

A Symantec Endpoint Protection administrator needs to comply with a service level agreement stipulating that all definitions must be internally quality assurance tested before being deployed to customers.

Which step should the administrator take?

A.

install a LiveUpdate Administrator Server

B.

install a Shared Insight Cache Server

C.

install a Group Update Provider (GUP) to the existing site

D.

install a Symantec Protection Center

Full Access
Question # 35

Which technology can prevent an unknown executable from being downloaded through a browser session?

A.

Browser Intrusion Prevention

B.

Download Insight

C.

Application Control

D.

SONAR

Full Access
Question # 36

An administrator is unknowingly trying to connect to a malicious website and download a known threat within a .rar file. All Symantec Endpoint Protection technologies are installed on the client’s system.

Drag and drop the technologies to the right side of the screen in the sequence necessary to block or detect the malicious file.

250-428 question answer

Full Access
Question # 37

Which action should an administrator take to prevent users from using Windows Security Center?

A.

Set Disable antivirus alert within Windows Security Center to Disable

B.

Set Disable Windows Security Center to Always

C.

Set Disable Windows Security Center to Disable

D.

Set Disable antivirus alert within Windows Security Center to Never

Full Access
Question # 38

Which two are policy types within the Symantec Endpoint Protection Manager? (Select two.)

A.

Intrusion Prevention

B.

Exceptions

C.

Process Control

D.

Shared Insight

E.

Host Protection

Full Access
Question # 39

When can an administrator add a new replication partner?

A.

immediately following the first LiveUpdate session of the new site

B.

during a Symantec Endpoint Protection Manager upgrade

C.

during the initial install of the new site

D.

immediately following a successful Active Directory sync

Full Access
Question # 40

An organization needs to add a collection of DNS host names to permit in the firewall policy.

How Should the SEP Administrator add these DNS host names as a single rule in the firewall policy?

A.

Create a Most Group and add the DNS host names. Then create a firewall rule with the new Host Group as the Source/ Destination

B.

Create a Host Group and add the DNS domain. Then create a firewall rule with the new Host Group as the Local/ Remote.

C.

Create a Host Group and add the DNS host names. Then create a firewall rule with the new Host Group as the Local/Remote

D.

Create a Host Group and add the DNS domain. Then create a firewall rule with the new Host Group as the Source/ Destination

Full Access