Which two considerations must an administrator make when enabling Application Learning in an environment?
Which two considerations must an administrator make when enabling Application Learning in an environment? (Select two.) A. Application Learning should be deployed on a small group of systems in the enterprise. B. Application Learning can generate significant CPU or memory use on a Symantec Endpoint Protection Manager. C. Application Learning is dependent on Insight. D. […]
Which tool should the administrator use to gather log files to submit to Symantec Technical Support?
A Symantec Endpoint Protection Manager (SEPM) administrator notices performance issues with the SEPM server. The Client tab becomes unresponsive in the SEPM console and .DAT files accumulate in the “agentinfo” folder. Which tool should the administrator use to gather log files to submit to Symantec Technical Support? A. collectLog.cmd B. LogExport.exe C. smc.exe D. ExportLog.vbs […]
Which setting can an administrator configure in the LiveUpdate policy?
Which setting can an administrator configure in the LiveUpdate policy? A. Linux Settings B. Frequency to download content. C. Specific content revision to download from a Group Update Provider (GUP) D. Specific content policies to download References: https://support.symantec.com/en_US/article.TECH104435.html
What is the most likely reason?
A Symantec Endpoint Protection (SEP) administrator creates a firewall policy to block FTP traffic and assigns the policy to all of the SEP clients. The network monitoring team informs the administrator that a client system is making an FTP connection to a server. While investigating the problem from the SEP client GUI, the administrator notices […]
Which mechanism does the SEP client use to select an alternate management server if the currently selected man
A Symantec Endpoint Protection (SEP) client uses a management server list with three management servers in the priority 1 list. Which mechanism does the SEP client use to select an alternate management server if the currently selected management server is unavailable? A. The client chooses the next server alphabetically by server name. B. The client […]
Which two options are supported Symantec Endpoint Manager authentication types?
Which two options are supported Symantec Endpoint Manager authentication types? (Select two.) A. Network Access Control B. Biometrics C. RSA SecurID D. MS-CHAP E. Microsoft Active Directory References: https://support.symantec.com/en_US/article.HOWTO81227.html
Which action should an administrator take to prevent users from using Windows Security Center?
Which action should an administrator take to prevent users from using Windows Security Center? A. Set Disable antivirus alert within Windows Security Center to Disable B. Set Disable Windows Security Center to Always C. Set Disable Windows Security Center to Disable D. Set Disable antivirus alert within Windows Security Center to Never
Which results are returned from the query?
An administrator uses the search criteria displayed in the image below. Which results are returned from the query? A. Only VMware Servers in the Default Group B. All Windows 2012 Servers in the Default Group C. Only Windows 2012 Servers that are Virtualized in the Default Group D. All Windows 2012 Servers and all Virtualized […]
Which Symantec Endpoint Protection defense mechanism provides protection against threats that propagate from s
Which Symantec Endpoint Protection defense mechanism provides protection against threats that propagate from system to system through the use of autorun.inf files? A. Host Integrity B. SONAR C. Application and Device Control D. Emulator
Which Symantec Endpoint Protection technology blocks a downloaded program from installing browser plugins?
Which Symantec Endpoint Protection technology blocks a downloaded program from installing browser plugins? A. Intrusion Prevention B. SONAR C. Tamper Protection D. Application and Device Control