Black Friday Biggest Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Symantec 250-561 Dumps

Page: 1 / 7
Total 70 questions

Endpoint Security Complete - Administration R1 Questions and Answers

Question 1

Which security threat uses malicious code to destroy evidence, break systems, or encrypt data?

Options:

A.

Execution

B.

Persistence

C.

Impact

D.

Discovery

Question 2

What characterizes an emerging threat in comparison to traditional threat?

Options:

A.

Emerging threats use new techniques and 0-day vulnerability to propagate.

B.

Emerging threats requires artificial intelligence to be detected.

C.

Emerging threats are undetectable by signature based engines.

D.

Emerging threats are more sophisticated than traditional threats.

Question 3

Which file property does SES utilize to search the VirusTotal website for suspicious file information?

Options:

A.

File reputation

B.

File size

C.

File name

D.

File hash

Question 4

Which Symantec component is required to enable two factor authentication with VIP on the Integrated Cyber Defense manager (ICDm)?

Options:

A.

A physical token or a software token

B.

A software token and a VIP server

C.

A software token and an active directory account

D.

A physical token or a secure USB key

Question 5

Which SEPM-generated element is required for an administrator to complete the enrollment of SEPM to the cloud console?

Options:

A.

Token

B.

SEPM password

C.

Certificate key pair

D.

SQL password

Question 6

Which file should an administrator create, resulting Group Policy Object (GPO)?

Options:

A.

Symantec__Agent_package_x64.zip

B.

Symantec__Agent_package_x64.msi

C.

Symantec__Agent_package__32-bit.msi

D.

Symantec__Agent_package_x64.exe

Question 7

Which two (2) steps should an administrator take to guard against re-occurring threats? (Select two)

Options:

A.

Confirm that daily active and weekly full scans take place on all endpoints

B.

Verify that all endpoints receive scheduled Live-Update content

C.

Use Power Eraser to clean endpoint Windows registries

D.

Add endpoints to a high security group and assign a restrictive Antimalware policy to the group

E.

Quarantine affected endpoints

Question 8

Which Security Control dashboard widget should an administrator utilize to access detailed areas for a given security control ?

Options:

A.

Learn More

B.

Quick Links

C.

More Info

D.

Latest Tasks

Question 9

Which alert rule category includes events that are generated about the cloud console?

Options:

A.

Security

B.

Diagnostic

C.

System

D.

Application Activity

Question 10

Which SES advanced feature detects malware by consulting a training model composed of known good and known bad fries?

Options:

A.

Signatures

B.

Advanced Machine Learning

C.

Reputation

D.

Artificial Intelligence

Page: 1 / 7
Total 70 questions