VMware

Symantec Endpoint Protection 14.x Admin R2 Technical Specialist

250-605

Validate your skills in endpoint protection with the 250-605 exam.

198 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 111–120 of 198

Q111

What happens when you disable Sonar features in Symantec Endpoint Protection?

  • A Only web traffic is affected
  • B Malware detection is improved
  • C Unknown threats are not monitored
  • D Firewall functions cease to work
Explanation Disabling Sonar reduces detection of unknown threats, while other options misattribute impacts.
Q112

Which service is essential for endpoint network communication in Symantec Endpoint Protection?

  • A Symantec Endpoint Protection Client
  • B Symantec Endpoint Protection Manager
  • C Symantec Endpoint Protection Agent
  • D Symantec Cloud Integration Service
Explanation The Symantec Endpoint Protection Manager is crucial for centralized management, while the other options serve different roles.
Q113

A company needs to ensure employees cannot download unauthorized applications. What feature should they utilize?

  • A Application Control
  • B Device Control
  • C Firewall Policies
  • D Intrusion Prevention System
Explanation Application Control allows the restriction of specific software while the others do not address application downloads.
Q114

You are configuring Client Group Settings. What happens if you enable "Client Data Sharing"?

  • A Clients share threat data
  • B Clients update definitions independently
  • C Clients become unmanaged
  • D Clients receive fewer updates
Explanation Enabling Client Data Sharing allows clients to exchange threat information, while the other options are inaccurate descriptions of client behavior.
Q115

Which service manages virus definitions in SEP?

  • A Symantec Protection Engine
  • B LiveUpdate
  • C Application and Device Control
  • D Network Threat Protection
Explanation LiveUpdate downloads and manages virus definitions; other options serve different purposes.
Q116

A company needs to prevent USB devices from being used. What should they configure?

  • A Firewall policies
  • B Application Control settings
  • C Device Control policies
  • D Endpoint Protection settings
Explanation Device Control policies specifically manage USB device usage; others do not address this requirement.
Q117

What happens when a user quarantines a suspicious file in SEP?

  • A The file is deleted immediately
  • B The file is moved to a safe location
  • C The file is backed up to the cloud
  • D The file is ignored until further notice
Explanation Quarantining moves the file to a safe location for analysis; other options do not describe quarantine behavior.
Q118

Which service does Symantec Endpoint Protection use to provide real-time protection?

  • A Symantec Protection Engine
  • B Symantec Central Management Server
  • C Symantec Endpoint Agent
  • D Symantec LiveUpdate
Explanation Symantec Protection Engine is responsible for real-time protection while the others serve different functions.
Q119

A company needs to ensure that only authorized USB devices connect to employee computers. What feature of Symantec Endpoint Protection should they use?

  • A Application Control
  • B Device Control
  • C Firewall Rules
  • D Network Access Control
Explanation Device Control specifically manages and restricts USB device access.
Q120

You are configuring a policy for web filtering in Symantec Endpoint Protection. What happens if an employee accesses a blocked site?

  • A Access is silently allowed
  • B Access is blocked with a warning
  • C Access is logged only
  • D Access is allowed for admins only
Explanation Blocked sites lead to a warning page for the user, while the other options are incorrect in this context.