Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

An administrator needs to add an Application Exception. When the administrator accesses the Application Exception dialog window, applications fail to appear.

What is the likely problem?

A.

The Symantec Endpoint Protection Manager is installed on a Domain Controller.

B.

The client computers already have exclusions for the applications.

C.

The Learn applications that run on the client computers setting is disabled.

D.

The clients are in a trusted Symantec Endpoint Protection domain.

You have executed the vxdg -g diskgroup adddisk disk_name= command.

Which switch needs to be added to force VxVM to take the disk media name of the failed disk and assign it to the new replacement disk?

A.

-force

B.

-k

C.

-f

D.

-assign

Which action does the Shared Insight Cache (SIC) server take when the whitelist reaches maximum capacity?

A.

The SIC server allocates additional memory for the whitelist as needed.

B.

The SIC server will start writing the cache to disk.

C.

The SIC server will remove the least recently used items based on the prune size.

D.

The SIC server will remove items with the fewest number of votes.

An administrator uses the search criteria displayed in the image below.

Which results are returned from the query?

A.

Only VMware Servers in the Default Group

B.

All Windows 2012 Servers in the Default Group

C.

Only Windows 2012 Servers that are Virtualized in the Default Group

D.

All Windows 2012 Servers and all Virtualized Servers in the Default Group

In addition to performance improvements, which two benefits does Insight provide? (Select two.)

A.

Reputation scoring for documents

B.

Zero-day threat detection

C.

Protection against malicious java scripts

D.

False positive mitigation

E.

Blocking of malicious websites

Which settings can impact the Files trusted count?

A.

System Lockdown Whitelist in the Application and Device Control Policy

B.

File Cache settings in the Virus and Spyware Protection policy

C.

Insight settings in the Virus and Spyware Protection policy

D.

SONAR settings in the Virus and Spyware Protection policy

A company has an application that requires network traffic in both directions to multiple systems at a specific external domain. A firewall rule was created to allow traffic to and from the external domain, but the rule is blocking incoming traffic.

What should an administrator enable in the firewall policy to allow this traffic?

A.

TCP resequencing

B.

Smart DHCP

C.

Reverse DNS Lookup

D.

Smart WINS

What optional Symantec Endpoint Protection component could an administrator utilize if an organization requires custom reports and queries?

A.

Q-Radar

B.

Splunk

C.

Crystal Reports

D.

IT Analytics

A company allows users to create firewall rules. During the course of business, users are accidentally adding rules that block a custom internal application.

Which steps should the Symantec Endpoint Protection administrator take to prevent users from blocking the custom application?

A.

Create an Allow All Firewall rule for the fingerprint of the file and place it at the bottom of the firewall rules above the blue line

B.

Create an Allow firewall rule for the application and place it at the bottom of the firewall rules below the blue line

C.

Create an Allow for the network adapter type used by the application and place it at the top of the firewall rules below the blue line.

D.

Create an Allow Firewall rule for the application and place it at the top of the firewall rules above the blue line.

A threat was detected by Auto-Protect on a client system.

Which command can an administrator run to determine whether additional threats exist?

A.

Restart Client Computer

B.

Update Content and Scan

C.

Enable Network Threat Protection

D.

Enable Download Insight