Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Symantec 250-550 Endpoint Security Complete - Administration R1 Exam Practice Test

Page: 1 / 0
Total 1 questions

Endpoint Security Complete - Administration R1 Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

What are two (2) benefits of a fully cloud managed endpoint protection solution? (Select two)

Options:

A.

Increased content update frequency

B.

Increased visibility

C.

Reduced 3rd party licensing cost

D.

Reduced database usage

E.

Reduced network usage

Question 2

Which two (2) steps should an administrator take to guard against re-occurring threats? (Select two)

Options:

A.

Confirm that daily active and weekly full scans take place on all endpoints

B.

Verify that all endpoints receive scheduled Live-Update content

C.

Use Power Eraser to clean endpoint Windows registries

D.

Add endpoints to a high security group and assign a restrictive Antimalware policy to the group

E.

Quarantine affected endpoints

Question 3

Which URL is responsible for notifying the SES agent that a policy change occurred in the cloud console?

Options:

A.

spoc.norton.com

B.

stnd-ipsg.crsi-symantec.com

C.

ent-shasta.rrs-symantec.com

D.

ocsp.digicert.com

Question 4

An administrator must create a custom role in ICDm.

Which area of the management console is able to have access restricted or granted?

Options:

A.

Policy Management

B.

Hybrid device management

C.

Agent deployment

D.

Custom Dashboard Creation

Question 5

Which technique randomizes the e memory address map with Memory Exploit Mitigation?

Options:

A.

SEHOP

B.

ROPHEAP

C.

ASLR

D.

ForceDEP

Question 6

Files are blocked by hash in the blacklist policy.

Which algorithm is supported, in addition to MD5?

Options:

A.

SHA256

B.

SHA256 "salted"

C.

MD5 "Salted"

D.

SHA2

Question 7

Which term or expression is utilized when adversaries leverage existing tools in the environment?

Options:

A.

opportunistic attack

B.

script kiddies

C.

living off the land

D.

file-less attack

Question 8

Which report template includes a summary of risk distribution by devices, users, and groups?

Options:

A.

Device Integrity

B.

Threat Distribution

C.

Comprehensive

D.

Weekly

Question 9

Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files. Results in a comparable number of false positives and false negatives."

Options:

A.

Level 5

B.

Level 2

C.

Level 1

D.

Level 6

Question 10

An endpoint is offline, and the administrator issues a scan command. What happens to the endpoint when it restarts, if it lacks connectivity?

Options:

A.

The system is scanning when started.

B.

The system downloads the content without scanning.

C.

The system starts without scanning.

D.

The system scans after the content update is downloaded.

Page: 1 / 0
Total 1 questions