Ensurepass

QUESTION 11

Which two options are available when configuring DNS change detected for SONAR? (Select two.)

 

A.

Block

B.

Active Response

C.

Quarantine

D.

Log

E.

Trace

 

Correct Answer: AD

&nb
sp;

 

QUESTION 12

Which technology can prevent an unknown executable from being downloaded through a browser session?

 

A.

Browser Intrusion Prevention

B.

Download Insight

C.

Application Control

D.

SONAR

 

Correct Answer: B

 

 

QUESTION 13

An administrator plans to implement a multi-site Symantec Endpoint Protection (SEP) deployment. The administrator needs to determine whether replication is viable without needing to make network firewall changes or change defaults in SEP. Which port should the administrator verify is open on the path of communication between the two proposed sites?

 

A.

1433

B.

2967

C.

8014

D.

8443

 

Correct Answer: D

 

 

QUESTION 14

You have just started a relayout operation in a live test environment, and you want to limit the impact of your work on concurrent testing activities. You also want to accommodate the need to constrain a relayout job’s performance impact on concurrent activities. What would you do to perform this task?

 

A.

Use the “set iodelay” option of vxtask to throttle the VxVM task.

B.

Use the “set iowait” option of vxtask to throttle the VxVM task.

C.

Use the “set slow” option of vxtask to throttle the VxVM task.

D.

Use the “set nice” option of vxtask to throttle the VxVM task.

 

Correct Answer: C

 

 

QUESTION 15

Which two criteria can an administrator use to determine hosts in a host group? (Select two.)

 

A.

Subnet

B.

Network Services

C.

Application Protocol

D.

DNS Domain

E.

Network Adapters

 

Correct Answer: AD

 

 

QUESTION 16

A Symantec Endpoint Protection (SEP) client uses a management server list with three management servers in the priority 1 list. Which mechanism does the SEP client use to select an alternate management server if the currently selected management server is unavail
able?

 

A.

The client chooses another server in the list randomly.

B.

The client chooses a server based on the lowest server load.

C.

The client chooses a server with the next highest IP address.

D.

The client chooses the next server alphabetically by server name.

 

Correct Answer: A

 

 

QUESTION 17

Refer to the exhibit. Which settings can impact the Files trusted count?

 

clip_image002

 

A.

SONAR settings in the Virus and Spyware Protection policy

B.

System Lockdown Whitelist in the Application and Device Control policy

C.

Insight settings in the Virus and Spyware Protection policy

D.

File Cache settings in the Virus and Spyware Protection policy

 

Correct Answer: C

 

 

QUESTION 18

An administrator configures the scan duration for a scheduled scan. The scan fails to complete in the specified time period. When will the next scheduled scan occur on the computer?

 

A.

when the computer reboots

B.

when the user restarts the scan

C.

at the next scheduled scan period

D.

within the next hour

 

Correct Answer: C

 

 

QUESTION 19

An administrator needs to configure Secure Socket Layer (SSL) communication for clients. In the httpd.conf file, located on the Symantec Endpoint Protection Manager (SEPM), the administrator removes the hashmark (#) from the text string displayed below.

 

#Include conf/ssl/sslForcClients.conf<

 

Which two tasks must the administrator perform to complete the SSL configuration? (Select two.)

 

A.

edit site.properties and change the port to 443

B.

restart the Symantec Endpoint Protection Manager Webserver service

C.

change the default certificates on the SEPM and reboot

D.

change the Management Server List and enable HTTPs

E.

change the port in Clients > Group > Policies > Settings > Communication Settings and force the clients to reconnect

 

Correct Answer: BD

 

 

QUESTION 20

What is a characteristic of a Symantec Endpoint Protection (SEP) domain?

 

A.

Each domain has its own management server and database.

B.

Every administrator from one domain can view data in other domains.

C.

Data for each domain is stored in its own separate SEP database.

D.

Domains share the same management server and database.

 

Correct Answer: D

 

Free VCE & PDF File for Symantec 250-315 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.