VMware

Symantec Endpoint Protection 14.x Admin R2 Technical Specialist

250-605

Validate your skills in endpoint protection with the 250-605 exam.

198 questions 0 views Free
Start Mock Test Timed · Full-length · Scored

Questions 161–170 of 198

Q161

A company needs to deploy antivirus policies via Symantec Endpoint Protection. What is the best approach?

  • A Use management console groups
  • B Apply policies on individual clients
  • C Manually install antivirus on each device
  • D Create a single global policy only
Explanation Using management console groups allows centralized and scalable policy deployment; the other options are inefficient or not recommended.
Q162

You are configuring firewall rules in Symantec Endpoint Protection. What happens when a rule is placed higher in the priority list?

  • A It's ignored if a lower rule exists
  • B It will always be applied first
  • C It filters traffic based on ports only
  • D It has no impact on rules below
Explanation Higher priority rules are evaluated first and can preempt lower priority ones; others misrepresent rule behavior.
Q163

Which service in Symantec Endpoint Protection scans files for malware?

  • A Virus and Spyware Protection
  • B Network Threat Protection
  • C Application Control
  • D Firewall Protection
Explanation Virus and Spyware Protection specifically scans files for malware, while others focus on different protection aspects.
Q164

A company needs to deploy a policy that limits users from executing unapproved software. What should you configure in Symantec Endpoint Protection?

  • A Device Control Policy
  • B Firewall Rule
  • C Application Control Policy
  • D Script Control Policy
Explanation Application Control Policy specifically allows you to enforce restrictions on unapproved applications; others do not achieve this goal.
Q165

What happens when you enable Hardware Compatibility Reporting in Symantec Endpoint Protection?

  • A Converts all clients to virtual systems
  • B Requests hardware changes from all endpoints
  • C Monitors and reports hardware compatibility
  • D Disables hardware device scanning
Explanation Enabling Hardware Compatibility Reporting monitors and reports the hardware compliance of endpoints, while the other options are incorrect interpretations of its functionality.
Q166

Which feature of SEP 14.x ensures real-time protection against threats?

  • A ActiveScan
  • B Endpoint Protection
  • C Threat Hunting
  • D Logs and Reports
Explanation Endpoint Protection provides real-time defense while the other options do not specifically represent this feature.
Q167

A company needs to implement policies that block unauthorized applications. Which SEP feature should they use?

  • A Application Control
  • B Firewall
  • C Device Control
  • D Antivirus
Explanation Application Control specifically manages application behavior, while the others serve different purposes.
Q168

You are configuring the 'Custom Response' feature in SEP. What happens when a threat is detected?

  • A Automatically quarantines the threat.
  • B Shuts down the computer instantly.
  • C Sends an email to the administrator.
  • D Executes a predefined action.
Explanation The 'Custom Response' feature defines actions to enact against detected threats, while the other options are not typical automatic responses.
Q169

Which service does Symantec Endpoint Protection use to manage client communications?

  • A Symantec Management Service
  • B Symantec Reporting Service
  • C Symantec Insight Service
  • D Symantec Threat Intelligence Service
Explanation The Symantec Management Service controls client interactions, while others serve different functions.
Q170

A company needs to prevent users from accessing known malicious websites. Which feature should they implement?

  • A File Reputation
  • B Web Filter
  • C Device Control
  • D Endpoint Detection and Response
Explanation The Web Filter specifically blocks access to dangerous sites, unlike the other options.