Which protection technology can detect botnet command and control traffic generated on the Symantec Endpoint Protection client machine?
Files are blocked by hash in the deny list policy. Which algorithm is supported, in addition to MD5?
Which SES security control protects a user against data leakage if they encounter a man-in-the-middle attack?
How would an administrator specify which remote consoles and servers have access to the management server?
Which IPS signature type is primarily used to identify specific unwanted network traffic?
What is the result of disjointed telemetry collection methods used within an organization?
Which Discover and Deploy process requires the LocalAccountTokenFilterPolicy value to be added to the Windows registry of endpoints, before the process begins?
Which statement demonstrates how Symantec EDR hunts and detects IoCs in the environment?
Which two (2) security controls are utilized by an administrator to mitigate threats associated with the Discovery phase? (Select two)
How should an administrator set up an alert to be notified when manual remediation is needed on an endpoint?
What does an end-user receive when an administrator utilizes the Invite User feature to distribute the SES client?
Which type of file attribute is valid for creating a block list entry with Symantec Endpoint Detection and Response (SEDR)?
What priority would an incident that may have an impact on business be considered?
The SES Intrusion Prevention System has blocked an intruder's attempt to establish an IRC connection inside the firewall. Which Advanced Firewall Protection setting should an administrator enable to prevent the intruder's system from communicating with the network after the IPS detection?
A Symantec Endpoint Protection (SEP) administrator receives multiple reports that machines are experiencing performance issues. The administrator discovers that the reports happen at about the same time as the scheduled LiveUpdate.
Which setting should the SEP administrator configure to minimize I/O when LiveUpdate occurs?
Which Incident View widget shows the parent-child relationship of related security events?
Which action can an administrator take to improve the Symantec Endpoint Protection Manager (SEPM) dashboard performance and report accuracy?
Which action is provided by Symantec EDR for the rapid remediation of impacted endpoints?
What type of Threat Defense for Active Directory alarms are displayed after domain misconfigurations or hidden backdoors are detected?
Which Incident View widget shows the parent-child relationship of related security events?
Administrators at a company share a single terminal for configuring Symantec Endpoint Protection. The administrators want to ensure that each administrator using the console is forced to authenticate using their individual credentials. They are concerned that administrators may forget to log off the terminal, which would easily allow others to gain access to the Symantec Endpoint Protection Manager (SEPM) console.
Which setting should the administrator disable to minimize the risk of non-authorized users logging into the SEPM console?
Which designation should an administrator assign to the computer configured to find unmanaged devices?
Which EDR feature is used to search for real-time indicators of compromise?
Which technique randomizes the memory address map with Memory Exploit Mitigation?
The Security Status on the console home page is failing to alert a Symantec Endpoint Protection (SEP) administrator when virus definitions are out of date.
How should the SEP administrator enable the Security Status alert?
Which SES feature helps administrators apply policies based on specific endpoint profiles?
Which two (2) criteria are used by Symantec Insight to evaluate binary executables? (Select two.)
Which rule types should be at the bottom of the list when an administrator adds device control rules?
Which default role has the most limited permission in the Integrated Cyber Defense Manager?