A company needs to track user behavior across devices. What Symantec feature should they utilize?
ADevice Control
BNetwork Access Control
CApplication Control
DUser Behavioral Analysis
Explanation
User Behavioral Analysis tracks activities; the others focus on device or network controls.
Q192
You are configuring exception policies in Symantec Endpoint Protection. What will happen if a file is excluded from scans?
AIt won't be scanned for threats.
BIt is automatically quarantined.
CIt will be monitored actively.
DIt is reported in logs.
Explanation
Excluding a file means it isn't scanned; others imply accountability or action that doesn't occur.
Q193
Which service is responsible for host isolation in Symantec Endpoint Protection?
AFirewall Service
BIntrusion Prevention Service
CNetwork Threat Protection
DApplication Control Service
Explanation
Network Threat Protection manages network traffic and can enforce host isolation features, while other services handle different security functions.
Q194
You are configuring policy settings for a specific group. What is the best practice for managing default policies?
AAlways override default policies.
BEdit default policies directly.
CClone default policies for modifications.
DDisable default policies entirely.
Explanation
Cloning default policies allows for custom settings while preserving the original configurations.
Q195
What happens when a computer runs out of storage space for Endpoint Protection?
ALogs will be deleted immediately.
BUpdates will be applied automatically.
CClients will stop reporting to the server.
DTemporary files will be compressed.
Explanation
If disk space is insufficient, clients may not be able to communicate with the SEPM, disrupting management functions.
Q196
Which service is responsible for enforcing policies in Symantec Endpoint Protection?
ASymantec Endpoint Protection Manager
BSymantec LiveUpdate
CSecurity Response Team
DSymantec Intrusion Prevention Service
Explanation
Symantec Endpoint Protection Manager enforces client policies; the others serve different functions.
Q197
A company needs to protect its endpoints and ensure no unauthorized software is running. What configuration should they enable?
AApplication Control
BDrive Encryption
CFirewall Rules
DWeb Lockdown
Explanation
Application Control prevents unauthorized software; the other options do not specifically address software restrictions.
Q198
What happens when a Symantec Endpoint Protection client gets disconnected from the Manager?
AIt stops all protection activities.
BIt continues to run locally applied policies.
CIt uninstalls itself automatically.
DIt switches to a trial version.
Explanation
The client continues to enforce locally applied policies while disconnected, contrary to the other options.