Which Firewall rule components should an administrator configure to blockfacebook.comuse during business hours?
A company deploys Symantec Endpoint Protection (SEP) to 50 virtual machines running on a single ESXi host.
Which configuration change can the administrator make to minimize sudden IOPS impact on the ESXi server while each SEP endpoint communicates with the Symantec Endpoint Protection Manager?
What happens when an administrator adds a file to the deny list?
Which SEP feature is required for using the SEDR Isolate function?
What does a medium-priority incident indicate?
A company uses a remote administration tool that is detected as Hacktool.KeyLoggPro and quarantined by Symantec Endpoint Protection (SEP).
Which step can an administrator perform to continue using the remote administration tool without detection by SEP?
What does the MITRE ATT&CK Matrix consist of?
What version number is assigned to a duplicated policy?
The Behavioral Heat Map indicates that a specific application and a specific behavior are never used together. What action can be safely set for the application behavior in a Behavioral Isolation policy?
Administrators at a company share a single terminal for configuring Symantec Endpoint Protection. The administrators want to ensure that each administrator using the console is forced to authenticate using their individual credentials. They are concerned that administrators may forget to log off the terminal, which would easily allow others to gain access to the Symantec Endpoint Protection Manager (SEPM) console.
Which setting should the administrator disable to minimize the risk of non-authorized users logging into the SEPM console?