Black Friday Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Symantec > Endpoint Protection 14 > 250-428

250-428 Administration of Symantec Endpoint Protection 14 Question and Answers

Question # 4

A large software company runs a small engineering department that is remotely located over a slow WAN connection.

Which option should the company use to install an exported Symantec Endpoint Protection (SEP) package to the remote site using the smallest amount of network bandwidth?

A.

a SEP package using Basic content

B.

a SEP package using a policy defined Single Group Update Provider (GUP)

C.

a SEP package using a policy defined Multiple Group Update Provider (GUP) list

D.

a SEP package using the Install Packages tab

Full Access
Question # 5

A company deploys Symantec Endpoint Protection client to its sales staff who travel across the country.

Which deployment method should the company use to notify its sales staff to install the client?

A.

Unmanaged Detector

B.

Client Deployment Wizard

C.

Pull mode

D.

Push mode

Full Access
Question # 6

An organization recently experienced a definition storm where clients downloaded full definition packages from the management server.

Where can the SEPM increase the amount of content revisions so that clients with older content can get delta updates?

A.

Click on Policies and select LiveUpdate. Edit the LiveUpdate Content policy.

B.

Edit the Site Properties and under the LiveUpdate tab, edit the amount of content revisions to keep.

C.

Click on Policies and select LiveUpdate. Edit the LiveUpdate Settings policy.

D.

Edit the Server Properties and under the LiveUpdate tab, edit the amount of content revisions to keep.

Full Access
Question # 7

Where can an administrator obtain the Sylink.xml file?

A.

C:\Program Files\Symantec\Symantec Endpoint Protection\ folder on the client

B.

C:\Program Files\Symantec\Symantec Endpoint Protection\Manager\data\inbox\agent\ folder on the Symantec Endpoint Protection Manager

C.

by selecting the client group and exporting the communication settings in the Symantec Endpoint Protection Manager Console

D.

by selecting the location and exporting the communication settings in the Symantec Endpoint Protection Manager Console

Full Access
Question # 8

Which Symantec Endpoint Protection Management (SEPM) database option is the default for deployments of fewer than 1,000 clients?

A.

EmbeddeD. Using the Sybase SQL Anywhere database that comes with the product

B.

On SEPM: Installing Microsoft SQL on the same server as the SEPM

C.

External to SEPM: Using a preexisting Microsoft SQL server in the environment

D.

EmbeddeD. Using the Microsoft SQL database that comes with the product

Full Access
Question # 9

An administrator is unknowingly trying to connect to a malicious website and download a known threat within a .rar file. All Symantec Endpoint Protection technologies are installed on the client’s system.

Drag and drop the technologies to the right side of the screen in the sequence necessary to block or detect the malicious file.

Full Access
Question # 10

An administrator changes the Virus and Spyware Protection policy for a specific group that disables Auto-Protect. The administrator assigns the policy and the client systems apply the corresponding policy serial number. Upon visual inspection of a physical client system, the policy serial number is correct. However, Auto-Protect is still enabled on the client system.

Which action should the administrator take to ensure that the desired setting is in place on the client?

A.

Restart the client system.

B.

Enable the padlock next to the setting in the policy.

C.

Run a command on the computer to Update Content

D.

Withdraw the Virus and Spyware Protection policy

Full Access
Question # 11

Where in the Symantec Endpoint Protection (SEP) management console will a SEP administrator find the option to allow all users to enable and disable the client firewall?

A.

Client User Interface Control Settings

B.

Overview in Firewall Policy

C.

Settings in Intrusion Prevention Policy

D.

System Lockdown in Group Policy

Full Access
Question # 12

What is a valid Symantec Endpoint Protection (SEP) single site design?

A.

Multiple MySQL databases

B.

One Microsoft SQL Server database

C.

One Microsoft SQL Express database

D.

Multiple embedded databases

Full Access
Question # 13

Which technology can prevent an unknown executable from being downloaded through a browser session?

A.

Browser Intrusion Prevention

B.

Download Insight

C.

Application Control

D.

SONAR

Full Access
Question # 14

Catastrophic hardware failure has occurred on a single Symantec Endpoint Protection Manager (SEPM) in an environment with two SEPMs.

What is the quickest way an administrator can restore the environment to its original state?

A.

Install a new SEPM into the existing site

B.

Reinstall the entire SEPM environment

C.

Clone the still functioning SEPM and change the server.properties file

D.

Build a new site and configure replication with the still functioning SEPM

Full Access
Question # 15

Which object in the Symantec Endpoint Protection Manager console describes the most granular level to which a policy can be assigned?

A.

Group

B.

Computer

C.

User

D.

Client

Full Access
Question # 16

In which two areas can host groups be used? (Select two.)

A.

Locations

B.

Download Insight

C.

IPS

D.

Application and Device Control

E.

Firewall

Full Access
Question # 17

How are Insight results stored?

A.

Encrypted on the Symantec Endpoint Protection Client

B.

Unencrypted on the Symantec Endpoint Protection Manager

C.

Encrypted on the Symantec Endpoint Protection Manager

D.

Unencrypted on the Symantec Endpoint Protection Client

Full Access
Question # 18

What is an appropriate use of a file fingerprint list?

A.

allow unknown files to be downloaded with Insight

B.

prevent programs from running

C.

prevent AntiVirus from scanning a file

D.

allow files to bypass Intrusion Prevention detection

Full Access
Question # 19

An administrator is troubleshooting a Symantec Endpoint Protection (SEP) replication.

Which component log should the administrator check to determine whether the communication between the two sites is working correctly?

A.

Tomcat

B.

Apache Web Server

C.

Group Update Provider (GUP)

D.

SQL Server

Full Access
Question # 20

After several failed logon attempts, the Symantec Endpoint Protection Manager (SEPM) has locked the default admin account. An administrator needs to make system changes as soon as possible to address an outbreak, but the admin account is the only account.

Which action should the administrator take to correct the problem with minimal impact to the existing environment?

A.

Wait 15 minutes and attempt to log on again

B.

Restore the SEPM from a backup

C.

Run the Management Server and Configuration Wizard to reconfigure the server

D.

Reinstall the SEPM

Full Access