Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which feature reduces the impact of Auto-Protect on a virtual client guest operating system?

A.

Network Shared Insight Cache

B.

Scan Randomization

C.

Virtual Shared Insight Cache

D.

Virtual Image Exception

What SEPM report should an administrator utilize to view the files that Download Insight detected on your computers, after configuring Download Insight?

A.

Risk Distribution

B.

SONAR Detection Results

C.

Risk Detections Count

D.

Download Risk Distribution

Which two criteria are used by Symantec Insight to evaluate binary executables? (Select two.)

A.

Age

B.

Prevalence

C.

Sensitivity

D.

Confidentiality

E.

Content

Which two items should an administrator enter in the License Activation Wizard to activate a license? (Select two.)

A.

password for the Symantec Licensing Site

B.

purchase order number

C.

serial number

D.

Symantec License file

E.

credit card number

What two (2) steps should an administrator take to troubleshoot firewall with the Symantec Endpoint Protection client (Select two.)

A.

Disable the Symantec Endpoint Protection client and reproduce the issue.

B.

Add an "Allow AH" traffic rule to the assigned firewall policy and reproduce the issue.

C.

Create an exclusion in the Exceptions policy and reproduce the issue.

D.

Withdraw the assigned firewall policy and reproduce the issue.

E.

Enable TSE debug on the Symantec Endpoint Protect client and reproduce the issue.

Which command attempts to find the name of the drive in the private region and to match it to a disk media record that is missing a disk access record?

A.

vxdisk

B.

vxdctl

C.

vxreattach

D.

vxrecover

What is the difference between a shared and non-shared policy?

A.

Shared policies can be edited and replaced for all groups and locations that use it. A non-shared policy is unique to a specific group or location.

B.

Shared policies are replicated to a Replication Partner. A non-shared policy is specific to a local SEPM site.

C.

Shared policies are used in Production. A non-shared policy is used in test and only work in Log Only mode.

D.

Shared policies are unique for a specific group and location. A nonshared policy can be edited and replaced for all groups and locations that use it.

An organization employs laptop users who travel frequently. The organization needs to acquire log data from these Symantec Endpoint Protection clients periodically. This must happen without the use of a VPN.

Internet routable traffic should be allowed to and from which component?

A.

Group Update Provider (GUP)

B.

LiveUpdate Administrator Server (LUA)

C.

Symantec Endpoint Protection Manager (SEPM)

D.

IT Analytics Server (ITA)

Where in the Symantec Endpoint Protection (SEP) management console will a SEP administrator find the option to allow all users to enable and disable the client firewall?

A.

Client User Interface Control Settings

B.

Overview in Firewall Policy

C.

Settings in Intrusion Prevention Policy

D.

System Lockdown in Group Policy

What is a valid Symantec Endpoint Protection (SEP) single site design?

A.

Multiple MySQL databases

B.

One Microsoft SQL Server database

C.

One Microsoft SQL Express database

D.

Multiple embedded databases