Black Friday Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Symantec > Symantec SCS Certification > 250-561

250-561 Endpoint Security Complete - Administration R1 Question and Answers

Question # 4

Why would an administrator choose the Server-optimized installation option when creating an installation package?

A.

To limit the Intrusion Prevention policy to use server-only signatures.

B.

To add the Server-optimized Firewall policy

C.

To add the SES client's Optimize Memory setting to the default server installation.

D.

To reduce the SES client's using resources that are required for other server-specific processes.

Full Access
Question # 5

Which two (2) options is an administrator able to use to prevent a file from being fasely detected (Select two)

A.

Assign the file a SHA-256 cryptographic hash

B.

Add the file to a Whitelist policy

C.

Reduce the Intensive Protection setting of the Antimalware policy

D.

Register the file with Symantec's False Positive database

E.

Rename the file

Full Access
Question # 6

Which URL is responsible for notifying the SES agent that a policy change occurred in the cloud console?

A.

spoc.norton.com

B.

stnd-ipsg.crsi-symantec.com

C.

ent-shasta.rrs-symantec.com

D.

ocsp.digicert.com

Full Access
Question # 7

Which device page should an administrator view to track the progress of an issued device command?

A.

Command Status

B.

Command History

C.

Recent Activity

D.

Activity Update

Full Access
Question # 8

What happens when an administrator blacklists a file?

A.

The file is assigned to the Blacklist task list

B.

The file is automatically quarantined

C.

The file is assigned to a chosen Blacklist policy

D.

The file is assigned to the default Blacklist policy

Full Access
Question # 9

Which report template includes a summary of risk distribution by devices, users, and groups?

A.

Device Integrity

B.

Threat Distribution

C.

Comprehensive

D.

Weekly

Full Access
Question # 10

Which antimalware intensity level is defined by the following: "Blocks files that are most certainly bad or potentially bad files. Results in a comparable number of false positives and false negatives."

A.

Level 5

B.

Level 2

C.

Level 1

D.

Level 6

Full Access