VMware

Symantec Endpoint Protection 14.x Admin R2 Technical Specialist

250-605

Validate your skills in endpoint protection with the 250-605 exam.

198 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 141–150 of 198

Q141

What happens when a user permanently deletes a quarantined file from Symantec Endpoint Protection?

  • A File remains in backup
  • B File is restored automatically
  • C File is irrecoverably removed
  • D File is unquarantined automatically
Explanation Permanently deleting a quarantined file irreversibly removes it, while other options suggest recovery or restoration that doesn't occur.
Q142

Which service in Symantec Endpoint Protection provides firewall capabilities?

  • A Network Threat Protection
  • B Antivirus and Antispyware
  • C LiveUpdate
  • D Application and Device Control
Explanation Network Threat Protection handles firewall functions, while others focus on antivirus, updates, or device management.
Q143

A company needs to block USB devices in a high-security environment. What feature should they configure?

  • A Application Control
  • B Network Access Control
  • C Device Control
  • D Traffic Filtering
Explanation Device Control specifically manages USB port access, whereas the others deal with applications or network traffic.
Q144

What happens when a policy is assigned to a group in Symantec Endpoint Protection?

  • A Only the client is updated
  • B The server installs the client
  • C All clients adopt the policy
  • D Policy takes effect after reboot
Explanation All clients in the group inherit the policy immediately, unlike other options which are incorrect in this context.
Q145

Which service should you monitor for client health?

  • A Risk Assessment Service
  • B Client Status Service
  • C Symantec Security Cloud
  • D System Policy Manager
Explanation The Client Status Service monitors the client's health metrics, while the others are not specifically focused on client health monitoring.
Q146

A company needs to identify a malicious file before it executes. What feature should they enable?

  • A On-Access Scanning
  • B Disk Encryption
  • C Firewall Policy
  • D Network Path Control
Explanation On-Access Scanning actively scans files as they are accessed, preventing malicious files from executing.
Q147

You are configuring client communication settings. What happens when a client cannot contact the management server?

  • A Client will automatically uninstall
  • B Client may switch to liveupdate
  • C Client continues with previous definitions
  • D Client cannot update at all
Explanation Clients maintain their last known definitions and can continue functioning even when communication is lost, whereas the others are incorrect client behavior.
Q148

Which service performs real-time threat analysis in Symantec Endpoint Protection?

  • A LiveUpdate
  • B Security Response
  • C Intelligent Threat Cloud
  • D Network Threat Protection
Explanation The Intelligent Threat Cloud provides real-time analysis of threats, while others serve different functions.
Q149

A company needs to protect its endpoints from unknown malware. What feature should they enable?

  • A Behavioral Analysis
  • B Application Control
  • C Intrusion Prevention
  • D Fixed Policy Management
Explanation Behavioral Analysis detects unknown malware by monitoring system behavior, whereas other options are less effective for this need.
Q150

You are configuring Client-Server communication. What happens if the communication port is changed on the client but not the server?

  • A Connection succeeds without issues.
  • B Client loses connection to server.
  • C Server crashes unexpectedly.
  • D Configuration reset to default.
Explanation The client will attempt to communicate on a different port, leading to a loss of connectivity.