QUESTION 71 A large-scale virus attack is occurring and a notification condition is configured to send an email whenever viruses infect five computers on the network. A Symantec Endpoint Protection administrator has set a one hour damper period for that notification condition. How many notifications does the administrator receive after 30 computers are infected in two hours?   A. 1 B. 2 C. 6 D. 15   Correct Answer: B     QUESTION 72 Which command attempts to find Read more [...]
QUESTION 61 Where in the Symantec Endpoint Protection (SEP) management console will a SEP administrator find the option to allow all users to enable and disable the client firewall?   A. Client User Interface Control Settings B. Overview in Firewall Policy C. Settings in Intrusion Prevention Policy D. System Lockdown in Group Policy   Correct Answer: A   QUESTION 62 A company deploys Symantec Endpoint Protection (SEP) to 50 virtual machines running on a single ESXi host. Read more [...]
QUESTION 51 An administrator is using the SylinkDrop tool to update a Symantec Endpoint Protection client install on a system. The client fails to migrate to the new Symantec Endpoint Protection Manager (SEPM), which is defined correctly in the Sylink.xml file that was exported from the SEPM. Which settings must be provided with SylinkDrop to ensure the successful migration to a new Symantec Endpoint Protection environment with additional Group Level Security Settings?   A. -s "silent" Read more [...]
QUESTION 41 A company deploys Symantec Endpoint Protection client to its sales staff who travel across the country. Which deployment method should the company use to notify its sales staff to install the client?   A. Push mode B. Client Deployment Wizard C. Pull mode D. Unmanaged Detector   Correct Answer: B     QUESTION 42 What is a f unction of the Symantec Endpoint Protection client?   A. uploads logs to the Shared Insight Cache B. sends and receives Read more [...]
QUESTION 31 A company uses a remote administration tool that is detected and quarantined by Symantec Endpoint Protection (SEP). Which step can an administrator perform to continue using the remote administration tool without detection by SEP?   A. create a Tamper Protect exception for the tool B. create an Application to Monitor exception for the tool C. create a Known Risk exception for the tool D. create a SONAR exception for the tool   Correct Answer: C     QUESTION Read more [...]
QUESTION 21 Which exception type can be configured?   A. Parent Process B. Browser Object C. MAC Address D. Trusted Web Domain   Correct Answer: D     QUESTION 22 A managed service provider (MSP) is managing Symantec Endpoint Protection for a number of independent companies. Each company has administrators who will log in from time to time to add new clients. Administrators must be prevented from seeing the existence of other companies in the console. What should Read more [...]
QUESTION 11 Which two options are available when configuring DNS change detected for SONAR? (Select two.)   A. Block B. Active Response C. Quarantine D. Log E. Trace   Correct Answer: AD &nb sp;   QUESTION 12 Which technology can prevent an unknown executable from being downloaded through a browser session?   A. Browser Intrusion Prevention B. Download Insight C. Application Control D. SONAR   Correct Answer: B     QUESTION 13 An administrator Read more [...]
QUESTION 1 Which setting can an administrator change that will result in the greatest impact on the speed of delivery of Symantec Endpoint Protection policy changes to the endpoints?   A. Download randomization B. Heartbeat interval C. LiveUpdate scheduling frequency D. Reconnection preferences   Correct Answer: D     QUESTION 2 What is a sup ported migration path for Symantec Endpoint Protection?   A. Symantec Endpoint Protection Enterprise Edition 12.1 Read more [...]
  QUESTION 221 John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He wants to get the status of the modules currently loaded in the kernel. Which of the following commands will John use to accomplish his task? Each correct answer represents a complete solution. Choose all that apply.   A. ls /proc B. lsmod C. locate D. cat /proc/modules   Correct Answer: Read more [...]