Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which Firewall rule components should an administrator configure to blockfacebook.comuse during business hours?

A.

Host(s), Network Interface, and Network Service

B.

Application, Host(s), and Network Service

C.

Action, Hosts(s), and Schedule

D.

Action, Application, and Schedule

A company deploys Symantec Endpoint Protection (SEP) to 50 virtual machines running on a single ESXi host.

Which configuration change can the administrator make to minimize sudden IOPS impact on the ESXi server while each SEP endpoint communicates with the Symantec Endpoint Protection Manager?

A.

Increase the download Insight sensitivity level

B.

Reduce the heartbeat interval

C.

Increase the download randomization window

D.

Reduce the number of content revisions to keep

What happens when an administrator adds a file to the deny list?

A.

The file is assigned to a chosen Deny List policy

B.

The file is assigned to the Deny List task list

C.

The file is automatically quarantined

D.

The file is assigned to the default Deny List policy

Which SEP feature is required for using the SEDR Isolate function?

A.

Host Isolation Policy

B.

Application Control

C.

Host Integrity Policy

D.

Application Detection

What does a medium-priority incident indicate?

A.

The incident may have an impact on the business

B.

The incident can result in a business outage

C.

The incident does not affect critical business operation

D.

The incident can safely be ignored

A company uses a remote administration tool that is detected as Hacktool.KeyLoggPro and quarantined by Symantec Endpoint Protection (SEP).

Which step can an administrator perform to continue using the remote administration tool without detection by SEP?

A.

Create a Tamper Protect exception for the tool

B.

Create an Application to Monitor exception for the tool

C.

Create a Known Risk exception for the tool

D.

Create a SONAR exception for the tool

What does the MITRE ATT&CK Matrix consist of?

A.

Problems and Solutions

B.

Attackers and Techniques

C.

Tactics and Techniques

D.

Entities and Tactics

What version number is assigned to a duplicated policy?

A.

The original policy's version number

B.

Zero

C.

The original policy's number plus one

D.

One

The Behavioral Heat Map indicates that a specific application and a specific behavior are never used together. What action can be safely set for the application behavior in a Behavioral Isolation policy?

A.

Deny

B.

Allow

C.

Delete

D.

Monitor

Administrators at a company share a single terminal for configuring Symantec Endpoint Protection. The administrators want to ensure that each administrator using the console is forced to authenticate using their individual credentials. They are concerned that administrators may forget to log off the terminal, which would easily allow others to gain access to the Symantec Endpoint Protection Manager (SEPM) console.

Which setting should the administrator disable to minimize the risk of non-authorized users logging into the SEPM console?

A.

Allow users to save credentials when logging on

B.

Delete clients that have not connected for specified time

C.

Lock account after the specified number of unsuccessful logon attempts

D.

Allow administrators to reset passwords