A company needs to control USB device access for sensitive workstations. What feature in Symantec Endpoint Protection can help achieve this?
AData Loss Prevention
BDevice Control
CWeb Filtering
DFirewall Rules
Explanation
Device Control specifically manages USB devices, unlike others.
Q132
You are configuring a endpoint group policy. What happens when you apply a policy with a higher priority to an endpoint?
AAll lower-priority settings are ignored
BAll settings merge accordingly
CIt reverts to default settings
DSettings remain unchanged
Explanation
Higher-priority policies override lower ones; others are incorrect in their effects.
Q133
Which service is responsible for the real-time protection in Symantec Endpoint Protection?
ACore Protection Service
BScan Service
CHost Integrity Service
DCentral Management Service
Explanation
Core Protection Service manages real-time protection, while others handle different tasks.
Q134
A company needs to configure firewall rules to allow specific traffic. Which feature should they utilize to achieve this effectively?
ACustom Firewall Policies
BDefault Firewall Settings
CIntrusion Prevention Policies
DClient Integrity Settings
Explanation
Custom Firewall Policies allow tailored rule configurations for traffic.
Q135
What happens when an endpoint is in a Low Bandwidth mode during an update?
AUpdates are skipped entirely
BOnly critical updates are applied
CFull updates are downloaded slowly
DReal-time protection is disabled
Explanation
Low Bandwidth mode applies only critical updates to save resources.
Q136
Which service in Symantec Endpoint Protection provides real-time protection against malware?
ASymantec Antivirus Client
BWeb Security Service
CHost Intrusion Prevention
DNetwork Threat Protection
Explanation
Symantec Antivirus Client provides real-time malware protection; the others focus on specific threats.
Q137
A company needs to ensure all endpoint systems adhere to compliance policies. What can be configured to enforce this?
AApplication Control Policies
BFirewall Rules
CLiveUpdate Notifications
DContent Filtering
Explanation
Application Control Policies enforce compliance; the others do not directly enforce compliance policies.
Q138
What happens when a Symantec Endpoint Protection client cannot connect to the management server?
AClient stops protecting the endpoint
BClient continues with last policy received
CClient uninstalls automatically
DClient returns to default settings
Explanation
The client continues with the last received policy until connection is restored.
Q139
Which service in Symantec Endpoint Protection manages network-based threats?
AIntrusion Prevention System
BFirewall Management
CEmail Filtering
DData Loss Prevention
Explanation
The Intrusion Prevention System specifically monitors and defends against network threats; the other services address different security areas.
Q140
A company needs to ensure that only company-owned devices can access its network. What feature should they implement?
ADevice Control
BApplication Control
CContent Filtering
DWeb Reputation
Explanation
Device Control restricts access based on device identification, whereas other options do not enforce device ownership restrictions.