Endpoint Security Complete - Administration R1 Questions and Answers
Which security threat uses malicious code to destroy evidence, break systems, or encrypt data?
What characterizes an emerging threat in comparison to traditional threat?
Which file property does SES utilize to search the VirusTotal website for suspicious file information?
Which Symantec component is required to enable two factor authentication with VIP on the Integrated Cyber Defense manager (ICDm)?
Which SEPM-generated element is required for an administrator to complete the enrollment of SEPM to the cloud console?
Which file should an administrator create, resulting Group Policy Object (GPO)?
Which two (2) steps should an administrator take to guard against re-occurring threats? (Select two)
Which Security Control dashboard widget should an administrator utilize to access detailed areas for a given security control ?
Which alert rule category includes events that are generated about the cloud console?
Which SES advanced feature detects malware by consulting a training model composed of known good and known bad fries?