Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

If an administrator enables the setting to manage policies from the cloud, what steps must be taken to reverse this process?

A.

Navigate to ICDm > Enrollment and disable the setting

B.

Unenroll the SEPM > Disable the setting > Re-enroll the SEPM

C.

Revoke policies from ICDm

D.

Revoke policies from SEPM

Which action can an administrator take to improve the Symantec Endpoint Protection Manager (SEPM) dashboard performance and report accuracy?

A.

Decreasing the number of content revisions to keep

B.

Lowering the client installation log entries

C.

Rebuilding database indexes

D.

Limiting the number of backups to keep

Which type of event does operation:1indicate in a SEDR database search?

A.

File Deleted.

B.

File Closed.

C.

File Open.

D.

File Created.

Which type of security threat is used by attackers to exploit vulnerable applications?

A.

Lateral Movement

B.

Privilege Escalation

C.

Credential Access

D.

Command and Control

Which type of communication is blocked, when isolating the endpoint by clicking on the isolate button in SEDR?

A.

All non-SEP and non-SEDR network communications

B.

All network communications

C.

Only SEP and SEDR network communications

D.

Only Web and UNC network communications

Which ICDm role is required in order to use LiveShell?

A.

Security Analyst

B.

Administrator

C.

Viewer

D.

Any

An administrator changes the Virus and Spyware Protection policy for a specific group that disables Auto-Protect. The administrator assigns the policy and the client systems apply the corresponding policy serial number. Upon visual inspection of a physical client system, the policy serial number is correct. However, Auto-Protect is still enabled on the client system.

Which action should the administrator take to ensure that the desired setting is in place for the client?

A.

Restart the client system

B.

Run a command on the computer to Update Content

C.

Enable the padlock next to the setting in the policy

D.

Withdraw the Virus and Spyware Protection policy

Which device page should an administrator view to track the progress of an issued device command?

A.

Command History

B.

Activity Update

C.

Command Status

D.

Recent Activity

An administrator notices that some entries list that the Risk was partially removed. The administrator needs to determine whether additional steps are necessary to remediate the threat.

Where in the Symantec Endpoint Protection Manager console can the administrator find additional information on the risk?

A.

Risk log

B.

Computer Status report

C.

Notifications

D.

Infected and At-Risk Computers report

What information is required to calculate storage requirements?

A.

Number of endpoints, available bandwidth, available disk space, number of endpoint dumps, dump size

B.

Number of endpoints, EAR data per endpoint per day, number of days to retain, number of endpoint dumps, dump size

C.

Number of endpoints, available bandwidth, number of days to retain, number of endpoint dumps, dump size

D.

Number of endpoints, EAR data per endpoint per day, available disk space, number of endpoint dumps, dump size