Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

An endpoint is offline, and the administrator issues a scan command. What happens to the endpoint when it restarts, if it lacks connectivity?

A.

The system is scanning when started.

B.

The system downloads the content without scanning.

C.

The system starts without scanning.

D.

The system scans after the content update is downloaded.

Which term or expression is utilized when adversaries leverage existing tools in the environment?

A.

opportunistic attack

B.

script kiddies

C.

living off the land

D.

file-less attack

Which Anti-malware technology should an administrator utilize to expose the malicious nature of a file created with a custom packet?

A.

Sandbox

B.

SONAR

C.

Reputation

D.

Emulator

Which IPS Signature type is Primarily used to identify specific unwanted traffic?

A.

Attack

B.

Probe

C.

Audit

D.

Malcode

An administrator is evaluating an organization's computers for an upcoming SES deployment. Which computer meets the pre-requisites for the SES client?

A.

A computer running Mac OS X 10.8 with 500 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor

B.

A computer running Mac OS X 10.14 with 400 MB of disk space, 4 GB of RAM, and an Intel Core 2 Duo 64-bit processor

C.

A computer running Windows 10 with 400 MB of disk space, 2 GB of RAM, and a 2.4 GHz Intel Pentium 4 processor

D.

A computer running Windows 8 with 380 MB of disk space, 2 GB of RAM, and a 2.8 GHz Intel Pentium 4 processor

Which statement best defines Machine Learning?

A.

A program that needs user input to perform a task.

B.

A program that teams from observing other programs.

C.

A program that learns from experience to optimize the output of a task.

D.

A program that require data to perform a task.

Which Endpoint > Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?

A.

Discover Endpoints

B.

Endpoint Enrollment

C.

Discover and Deploy

D.

Device Discovery

Which option should an administrator utilize to temporarily or permanently block a file?

A.

Delete

B.

Hide

C.

Encrypt

D.

Blacklist

Which URL is responsible for notifying the SES agent that a policy change occurred in the cloud console?

A.

spoc.norton.com

B.

stnd-ipsg.crsi-symantec.com

C.

ent-shasta.rrs-symantec.com

D.

ocsp.digicert.com

Which rule types should be at the bottom of the list when an administrator adds device control rules?

A.

General "catch all" rules

B.

General "brand defined" rules

C.

Specific "device type" rules

D.

Specific "device model" rules