What happens when you disable Sonar features in Symantec Endpoint Protection?
AOnly web traffic is affected
BMalware detection is improved
CUnknown threats are not monitored
DFirewall functions cease to work
Explanation
Disabling Sonar reduces detection of unknown threats, while other options misattribute impacts.
Q112
Which service is essential for endpoint network communication in Symantec Endpoint Protection?
ASymantec Endpoint Protection Client
BSymantec Endpoint Protection Manager
CSymantec Endpoint Protection Agent
DSymantec Cloud Integration Service
Explanation
The Symantec Endpoint Protection Manager is crucial for centralized management, while the other options serve different roles.
Q113
A company needs to ensure employees cannot download unauthorized applications. What feature should they utilize?
AApplication Control
BDevice Control
CFirewall Policies
DIntrusion Prevention System
Explanation
Application Control allows the restriction of specific software while the others do not address application downloads.
Q114
You are configuring Client Group Settings. What happens if you enable "Client Data Sharing"?
AClients share threat data
BClients update definitions independently
CClients become unmanaged
DClients receive fewer updates
Explanation
Enabling Client Data Sharing allows clients to exchange threat information, while the other options are inaccurate descriptions of client behavior.
Q115
Which service manages virus definitions in SEP?
ASymantec Protection Engine
BLiveUpdate
CApplication and Device Control
DNetwork Threat Protection
Explanation
LiveUpdate downloads and manages virus definitions; other options serve different purposes.
Q116
A company needs to prevent USB devices from being used. What should they configure?
AFirewall policies
BApplication Control settings
CDevice Control policies
DEndpoint Protection settings
Explanation
Device Control policies specifically manage USB device usage; others do not address this requirement.
Q117
What happens when a user quarantines a suspicious file in SEP?
AThe file is deleted immediately
BThe file is moved to a safe location
CThe file is backed up to the cloud
DThe file is ignored until further notice
Explanation
Quarantining moves the file to a safe location for analysis; other options do not describe quarantine behavior.
Q118
Which service does Symantec Endpoint Protection use to provide real-time protection?
ASymantec Protection Engine
BSymantec Central Management Server
CSymantec Endpoint Agent
DSymantec LiveUpdate
Explanation
Symantec Protection Engine is responsible for real-time protection while the others serve different functions.
Q119
A company needs to ensure that only authorized USB devices connect to employee computers. What feature of Symantec Endpoint Protection should they use?
AApplication Control
BDevice Control
CFirewall Rules
DNetwork Access Control
Explanation
Device Control specifically manages and restricts USB device access.
Q120
You are configuring a policy for web filtering in Symantec Endpoint Protection. What happens if an employee accesses a blocked site?
AAccess is silently allowed
BAccess is blocked with a warning
CAccess is logged only
DAccess is allowed for admins only
Explanation
Blocked sites lead to a warning page for the user, while the other options are incorrect in this context.