A company needs to deploy antivirus policies via Symantec Endpoint Protection. What is the best approach?
AUse management console groups
BApply policies on individual clients
CManually install antivirus on each device
DCreate a single global policy only
Explanation
Using management console groups allows centralized and scalable policy deployment; the other options are inefficient or not recommended.
Q162
You are configuring firewall rules in Symantec Endpoint Protection. What happens when a rule is placed higher in the priority list?
AIt's ignored if a lower rule exists
BIt will always be applied first
CIt filters traffic based on ports only
DIt has no impact on rules below
Explanation
Higher priority rules are evaluated first and can preempt lower priority ones; others misrepresent rule behavior.
Q163
Which service in Symantec Endpoint Protection scans files for malware?
AVirus and Spyware Protection
BNetwork Threat Protection
CApplication Control
DFirewall Protection
Explanation
Virus and Spyware Protection specifically scans files for malware, while others focus on different protection aspects.
Q164
A company needs to deploy a policy that limits users from executing unapproved software. What should you configure in Symantec Endpoint Protection?
ADevice Control Policy
BFirewall Rule
CApplication Control Policy
DScript Control Policy
Explanation
Application Control Policy specifically allows you to enforce restrictions on unapproved applications; others do not achieve this goal.
Q165
What happens when you enable Hardware Compatibility Reporting in Symantec Endpoint Protection?
AConverts all clients to virtual systems
BRequests hardware changes from all endpoints
CMonitors and reports hardware compatibility
DDisables hardware device scanning
Explanation
Enabling Hardware Compatibility Reporting monitors and reports the hardware compliance of endpoints, while the other options are incorrect interpretations of its functionality.
Q166
Which feature of SEP 14.x ensures real-time protection against threats?
AActiveScan
BEndpoint Protection
CThreat Hunting
DLogs and Reports
Explanation
Endpoint Protection provides real-time defense while the other options do not specifically represent this feature.
Q167
A company needs to implement policies that block unauthorized applications. Which SEP feature should they use?
AApplication Control
BFirewall
CDevice Control
DAntivirus
Explanation
Application Control specifically manages application behavior, while the others serve different purposes.
Q168
You are configuring the 'Custom Response' feature in SEP. What happens when a threat is detected?
AAutomatically quarantines the threat.
BShuts down the computer instantly.
CSends an email to the administrator.
DExecutes a predefined action.
Explanation
The 'Custom Response' feature defines actions to enact against detected threats, while the other options are not typical automatic responses.
Q169
Which service does Symantec Endpoint Protection use to manage client communications?
ASymantec Management Service
BSymantec Reporting Service
CSymantec Insight Service
DSymantec Threat Intelligence Service
Explanation
The Symantec Management Service controls client interactions, while others serve different functions.
Q170
A company needs to prevent users from accessing known malicious websites. Which feature should they implement?
AFile Reputation
BWeb Filter
CDevice Control
DEndpoint Detection and Response
Explanation
The Web Filter specifically blocks access to dangerous sites, unlike the other options.