Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which security control performs a cloud lookup on files downloaded during the Initial Access phase?

A.

Exploit Protection

B.

Auto-Protect

C.

Intrusion Prevention

D.

Antimalware

Performance on a SEPM is less than expected and generates intermittent errors. How could the system administrators be notified of performance issues?

A.

Add aSystem event alertand specify how often the notifications need to be raised. Specify the e-mail address that needs to be notified and the action when the server health becomes poor.

B.

Add anAuthentication alertand specify how often the notifications need to be raised. Specify the e-mail address that needs to be notified and the action when the server health becomes poor.

C.

Add aClient security alertand specify how often the notifications need to be raised. Specify the e-mail address that needs to be notified and the action when the server health becomes poor.

D.

Add aServer health alertand specify how often the notifications need to be raised. Specify the e-mail address that needs to be notified and the action when the server health becomes poor.

An Incident Responder has determined that an endpoint is compromised by a malicious threat. What SEDR feature would be utilized first to contain the threat?

A.

File Deletion

B.

Incident Manager

C.

Isolation

D.

Endpoint Activity Recorder

What is a feature of Cynic?

A.

Local Sandboxing

B.

Forwarding event data to Security Information and Event Management (SIEM)

C.

Cloud Sandboxing

D.

Customizable OS Images

An organization identifies a threat in its environment and needs to limit the spread of the threat. How should the SEP Administrator block the threat using Application and Device Control?

A.

Gather the MD5 hash of the file and create an Application Content Rule that blocks the file based on the file fingerprint.

B.

Gather the process name of the file and create an Application Content Rule that blocks the file based on the device ID type.

C.

Gather the MD5 hash of the file and create an Application Content Rule that uses regular expression matching.

D.

Gather the MD5 hash of the file and create an Application Content Rule that blocks the file based on specific arguments.

In what order should an administrator configure the integration between SEDR and Symantec Endpoint Protection in order to maximize their benefits?

A.

Synapse, ECC, then Insight Proxy

B.

ECC, Synapse, then Insight Proxy

C.

Insight Proxy, Synapse, then ECC

D.

ECC, Insight Proxy, then Synapse

Which technology can prevent an unknown executable from being downloaded through a browser session?

A.

Intrusion Prevention

B.

Insight

C.

Application Control

D.

Advanced Machine Learning

Which type of security threat continues to threaten endpoint security after a system reboot?

A.

file-less

B.

memory attack

C.

script

D.

Rootkit

Using a hybrid environment, if a SEPM-managed endpoint cannot connect to the SEPM, how quickly can an administrator receive a security alert if the endpoint is using a public hot-spot?

A.

After a VPN is activated with Network Integrity

B.

When the client connects to SEPM

C.

At the next heartbeat

D.

Immediately

An organization would like to use a content distribution method that centrally controls content types and versions. Almost all of their endpoints are running Windows.

What type of content distribution method should be used?

A.

Management Server

B.

Group Update Provider

C.

Internal LiveUpdate Server

D.

External LiveUpdate Server