3 Months Free Update
3 Months Free Update
3 Months Free Update
An organization identifies a threat in its environment and needs to limit the spread of the threat. How should the SEP Administrator block the threat using Application and Device Control?
A file has been identified as malicious.
Which feature of SEDR allows an administrator to manually block a specific file hash?
After several failed logon attempts, the Symantec Endpoint Protection Manager (SEPM) has locked the default admin account. An administrator needs to make system changes as soon as possible to address an outbreak, but the admin account is the only account.
Which action should the administrator take to correct the problem with minimal impact on the existing environment?
Administrators at a company share a single terminal for configuring Symantec Endpoint Protection. The administrators want to ensure that each administrator using the console is forced to authenticate using their individual credentials. They are concerned that administrators may forget to log off the terminal, which would easily allow others to gain access to the Symantec Endpoint Protection Manager (SEPM) console.
Which setting should the administrator disable to minimize the risk of non-authorized users logging into the SEPM console?
Which technology can prevent an unknown executable from being downloaded through a browser session?
Which designation should an administrator assign to the computer configured to find unmanaged devices?
What EDR function minimizes the risk of an endpoint infecting other resources in the environment?
An organization identifies a threat in its environment and needs to limit the spread of the threat. How should the SEP Administrator block the threat using Application and Device Control?
Which security threat stage seeks to gather valuable data and upload it to a compromised system?
A user is unknowingly about to connect to a malicious website and download a known threat within a .rar file. All Symantec Endpoint Protection technologies are installed on the client's system.
In which feature set order must the threat pass through to successfully infect the system?
What prevention technique does Threat Defense for Active Directory use to expose attackers?
What does the Endpoint Communication Channel (ECC) 2.0 allow Symantec EDR to directly connect to?
The SES Intrusion Prevention System has blocked an intruder's attempt to establish an IRC connection inside the firewall. Which Advanced Firewall Protection setting should an administrator enable to prevent the intruder's system from communicating with the network after the IPS detection?
What is the result of disjointed telemetry collection methods used within an organization?
Which Firewall rule components should an administrator configure to blockfacebook.comuse during business hours?
Why is it important for an Incident Responder to copy malicious files to the SEDR file store or create an image of the infected system during the Recovery phase?
An Incident Responder has determined that an endpoint is compromised by a malicious threat. What SEDR feature would be utilized first to contain the threat?
What is the purpose of a Threat Defense for Active Directory Deceptive Account?
Which two (2) scan range options are available to an administrator for locating unmanaged endpoints? (Select two)
Which designation should an administrator assign to the computer configured to find unmanaged devices?
What should an administrator know regarding the differences between a Domain and a Tenant in ICDm?
Which other items may be deleted when deleting a malicious file from an endpoint?
Which two (2) instances could cause Symantec Endpoint Protection to be unable to remediate a file? (Select two.)
How would an administrator specify which remote consoles and servers have access to the management server?
Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files results in a comparable number of false positives and false negatives."
When a SEPM is enrolled in ICDm, which policy can only be managed from the cloud?
Which option should an administrator utilize to temporarily or permanently block a file?
What does an end-user receive when an administrator utilizes the Invite User feature to distribute the SES client?
An administrator notices that some entries list that the Risk was partially removed. The administrator needs to determine whether additional steps are necessary to remediate the threat.
Where in the Symantec Endpoint Protection Manager console can the administrator find additional information on the risk?
A Symantec Endpoint Protection (SEP) administrator receives multiple reports that machines are experiencing performance issues. The administrator discovers that the reports happen at about the same time as the scheduled LiveUpdate.
Which setting should the SEP administrator configure to minimize I/O when LiveUpdate occurs?
Which action is provided by Symantec EDR for the rapid remediation of impacted endpoints?
Which Discover and Deploy process requires the LocalAccountTokenFilterPolicy value to be added to the Windows registry of endpoints, before the process begins?
Which report template type should an administrator utilize to create a daily summary of network threats detected?
When a SEPM is enrolled in ICDm, which policy can only be managed from the cloud?
Which Incident View widget shows the parent-child relationship of related security events?
Which of the following is a benefit of choosing a hybrid SES Complete architecture?