Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

250-561 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

250-561 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: Endpoint Security Complete - Administration R1
  • Last Update: Jun 22, 2025
  • Questions and Answers: 70
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

250-561 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

250-561 Practice Exam Questions with Answers Endpoint Security Complete - Administration R1 Certification

Question # 6

What must an administrator check prior to enrolling an on-prem SEPM infrastructure into the cloud?

A.

Clients are running SEP 14.2 or later

B.

Clients are running SEP 14.1.0 or later

C.

Clients are running SEP 12-6 or later

D.

Clients are running SEP 14.0.1 or late

Full Access
Question # 7

Which two (2) Discovery and Deploy features could an administrator use to enroll MAC endpoints? (Select two)

A.

Push Enroll

B.

A custom Installation package creator pact

C.

A default Direct Installation package

D.

Invite User

E.

A custom Direct installation package

Full Access
Question # 8

Which two (2) skill areas are critical to the success of incident Response Teams (Select two)

A.

Project Management

B.

Incident Management

C.

Cyber Intelligence

D.

Incident Response

E.

Threat Analysis

Full Access
Question # 9

Which device page should an administrator view to track the progress of an issued device command?

A.

Command Status

B.

Command History

C.

Recent Activity

D.

Activity Update

Full Access
Question # 10

Which security threat uses malicious code to destroy evidence, break systems, or encrypt data?

A.

Execution

B.

Persistence

C.

Impact

D.

Discovery

Full Access
Question # 11

What are the Exploit Mitigation security control's mitigation techniques designed to prevent?

A.

Packed file execution

B.

Misbehaving applications

C.

File-less attacks

D.

Rootkit downloads

Full Access
Question # 12

Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files. Results in a comparable number of false positives and false negatives."

A.

Level 5

B.

Level 2

C.

Level 1

D.

Level 6

Full Access
Question # 13

What does SES's advanced search feature provide when an administrator searches for a specific term?

A.

A search modifier dialog

B.

A search wizard dialog

C.

A suggested terms dialog

D.

A search summary dialog

Full Access
Question # 14

What happens when an administrator blacklists a file?

A.

The file is assigned to the Blacklist task list

B.

The file is automatically quarantined

C.

The file is assigned to a chosen Blacklist policy

D.

The file is assigned to the default Blacklist policy

Full Access
Question # 15

Which SEPM-generated element is required for an administrator to complete the enrollment of SEPM to the cloud console?

A.

Token

B.

SEPM password

C.

Certificate key pair

D.

SQL password

Full Access
Question # 16

Which file should an administrator create, resulting Group Policy Object (GPO)?

A.

Symantec__Agent_package_x64.zip

B.

Symantec__Agent_package_x64.msi

C.

Symantec__Agent_package__32-bit.msi

D.

Symantec__Agent_package_x64.exe

Full Access
Question # 17

Which SES feature helps administrator apply policies based on specific endpoint profiles?

A.

Device Groups

B.

Device Profiles

C.

Policy Bundles

D.

Policy Groups

Full Access
Question # 18

Which default role has the most limited permission in the Integrated Cyber Defense Manager?

A.

Restricted Administrator

B.

Limited Administrator

C.

Server Administrator

D.

Endpoint Console Domain Administrator

Full Access
Question # 19

In the ICDm, administrators are assisted by the My Task view. Which automation type creates the tasks within the console?

A.

Artificial Intelligence

B.

Machine Learning

C.

Advanced Machine Learning

D.

Administrator defined rules

Full Access
Question # 20

An administrator suspects that several computers have become part of a botnet. What should the administrator do to detect botnet activity on the network?

A.

Enable the Command and Control Server Firewall

B.

Add botnet related signatures to the IPS policy's Audit Signatures list

C.

Enable the IPS policy's Show notification on the device setting

D.

Set the Antimalware policy's Monitoring Level to 4

Full Access
Question # 21

Which report template out format should an administrator utilize to generate graphical reports?

A.

XML

B.

HTML

C.

PFD

D.

XML

Full Access