Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

In the virus and Spyware Protection policy, an administrator sets the First action to Clean risk and sets If first action fails to Delete risk. Which two (2) factors should the administrator consider? (Select two.)

A.

The deleted file may still be in the Recycle Bin.

B.

IT Analytics may keep a copy of the file for investigation.

C.

False positives may delete legitimate files.

D.

Insight may back up the file before sending it to Symantec.

E.

A copy of the threat may still be in the quarantine.

Which default role has the most limited permission in the Integrated Cyber Defense Manager?

A.

Endpoint Console Domain Administrator

B.

Server Administrator

C.

Restricted Administrator

D.

Limited Administrator

A Symantec Endpoint Protection (SEP) client uses a management server list with three management servers in the priority 1 list.

Which mechanism does the SEP client use to select an alternate management server if the currently selected management server is unavailable?

A.

The client chooses another server in the list randomly.

B.

The client chooses a server based on the lowest server load.

C.

The client chooses a server with the next highest IP address.

D.

The client chooses the next server alphabetically by server name.

What is the maximum number of endpoints a single SEDR Manager can support?

A.

200,000

B.

25,000

C.

100,000

D.

50,000

What Symantec Best Practice is recommended when setting up Active Directory integration with the Symantec Endpoint Protection Manager?

A.

Ensure there is more than one Active Directory Server listed in the Server Properties.

B.

Link the built-in Admin account to an Active Directory account.

C.

Import the existing AD structure to organize clients in user mode.

D.

Secure the management console by denying access to certain computers.

What are the two (2) locations where an Incident Responder should gather data for an After Actions Report in SEDR? (Select two)

A.

Incident Manager

B.

Policies

C.

Syslog

D.

Action Manager

E.

Endpoint Search

A file has been identified as malicious.

Which feature of SEDR allows an administrator to manually block a specific file hash?

A.

Playbooks

B.

Quarantine

C.

Allow List

D.

Block List

Which Endpoint Setting should an administrator utilize to locate unmanaged endpoints on a network subnet?

A.

Device Discovery

B.

Endpoint Enrollment

C.

Discover and Deploy

D.

Discover Endpoints

In which phase of the MITRE framework would attackers exploit faults in software to directly tamper with system memory?

A.

Defense Evasion

B.

Execution

C.

Exfiltration

D.

Discovery

What is the result of disjointed telemetry collection methods used within an organization?

A.

Investigators lack granular visibility

B.

Back of orchestration across controls

C.

False positives are seen

D.

Attacks continue to spread during investigation